Methods and systems for finding specific line of source code

Information

  • Patent Application
  • 20020023257
  • Publication Number
    20020023257
  • Date Filed
    April 20, 2001
    23 years ago
  • Date Published
    February 21, 2002
    22 years ago
Abstract
Methods and systems consistent with the present invention provide an improved software development tool that allows a developer to locate a portion of source code corresponding to a message from a verification tool. The improved software development tool displays a graphical representation of the portion of the source code corresponding to the message in a visually distinctive manner.
Description


FIELD OF THE INVENTION

[0015] The present invention relates to a method and system for developing software. More particularly, the invention relates to a method and system for locating source code corresponding to a message from a verification tool.



BACKGROUND OF THE INVENTION

[0016] Computer instructions are written in source code. Although a skilled programmer can understand source code to determine what the code is designed to accomplish, with highly complex software systems, a graphical representation or model of the source code is helpful to organize and visualize the structure and components of the system. Using models, the complex systems are easily identified, and the structural and behavioral patterns can be visualized and documented.


[0017] The well-known Unified Modeling Language (UML) is a general-purpose notational language for visualizing, specifying, constructing, and documenting complex software systems. UML is used to model systems ranging from business information systems to Web-based distributed systems, to real-time embedded systems. UML formalizes the notion that real-world objects are best modeled as self-contained entities that contain both data and functionality. UML is more clearly described in the following references, which are incorporated herein by reference: (1) Martin Fowler, UML Distilled Second Edition: Applying the Standard Object Modeling Language, Addison-Wesley (1999); (2) Booch, Rumbaugh, and Jacobson, The Unified Modeling Language User Guide, Addison-Wesley (1998); (3) Peter Coad, Jeff DeLuca, and Eric Lefebvre, Java Modeling in Color with UML: Enterprise Components and Process, Prentice Hall (1999); and (4) Peter Coad, Mark Mayfield, and Jonathan Kern, Java Design: Building Better Apps & Applets (2nd Ed.), Prentice Hall (1998).


[0018] As shown in FIG. 1, conventional software development tools 100 allow a programmer to view UML 102 while viewing source code 104. The source code 104 is stored in a file, and a reverse engineering module 106 converts the source code 104 into a representation of the software project in a database or repository 108. The software project comprises source code 104 in at least one file which, when compiled, forms a sequence of instructions to be run by the data processing system. The repository 108 generates the UML 102. If any changes are made to the UML 102, they are automatically reflected in the repository 108, and a code generator 110 converts the representation in the repository 108 into source code 104. Such software development tools 100, however, do not synchronize the displays of the UML 102 and the source code 104. Rather, the repository 108 stores the representation of the software project while the file stores the source code 104. A modification in the UML 102 does not appear in the source code 104 unless the code generator 110 re-generates the source code 104 from the data in the repository 108. When this occurs, the portion of the source code 104 that is not protected from being overwritten is rewritten. Similarly, any modifications made to the source code 104 do not appear in the UML 102 unless the reverse engineering module 106 updates the repository 108. As a result, redundant information is stored in the repository 108 and the source code 104. In addition, rather than making incremental changes to the source code 104, conventional software development tools 100 rewrite the overall source code 104 when modifications are made to the UML 102, resulting in wasted processing time. This type of manual, large-grained synchronization requires either human intervention, or a “batch” style process to try to keep the two views (the UML 102 and the source code 104) in sync. Unfortunately, this approach, adopted by many tools, leads to many undesirable side-effects; such as desired changes to the source code being overwritten by the tool. A further disadvantage with conventional software development tools 100 is that they are designed to only work in a single programming language. Thus, a tool 100 that is designed for Java™ programs cannot be utilized to develop a program in C++. There is a need in the art for a tool that avoids the limitations of these conventional software development tools.



SUMMARY OF THE INVENTION

[0019] Methods and systems consistent with the present invention provide an improved software development tool that overcomes the limitations of conventional software development tools. The improved software development tool of the present invention allows a developer to simultaneously view a graphical and a textual display of source code. The graphical and textual views are synchronized so that a modification in one view is automatically reflected in the other view. In addition, the software development tool is designed for use with more than one programming language.


[0020] The improved software development tool enables a developer to quickly determine the location of an error detected by a verification tool. Not only can the developer locate the specific line of source code, but the software development tool also displays the graphical representation of the source code corresponding to the message in a visually distinctive manner. This assists the developer in debugging the source code by allowing the developer to visually determine the location of the error.


[0021] In accordance with methods consistent with the present invention, a method is provided in a data processing system for developing source code. The method comprises the steps of receiving a message corresponding to a portion of the source code, and displaying the graphical representation of the portion of the source code corresponding to the message in a visually distinctive manner.


[0022] In accordance with methods consistent with the present invention, a method is provided in a data processing system for developing source code. The method comprises the steps of detecting an error in the source code, generating a message reflecting the error, and displaying the graphical representation of the portion of the source code corresponding to the message in a visually distinctive manner.


[0023] In accordance with articles of manufacture consistent with the present invention, a computer-readable medium is provided. The computer-readable medium contains instructions for controlling a data processing system to perform a method. The data processing system has source code. The method comprises the steps of receiving a message corresponding to a portion of the source code, and displaying the graphical representation of the portion of the source code corresponding to the message in a visually distinctive manner.


[0024] In accordance with articles of manufacture consistent with the present invention, a computer-readable medium is provided. The computer-readable medium contains instructions for controlling a data processing system to perform a method. The data processing system has source code. The method comprises the steps of detecting an error in the source code, generating a message reflecting the error, and displaying the graphical representation of the portion of the source code corresponding to the message in a visually distinctive manner.


[0025] Other systems, methods, features and advantages of the invention will be or will become apparent to one with skill in the art upon examination of the following figures and detailed description. It is intended that all such additional systems, methods, features and advantages be included within this description, be within the scope of the invention, and be protected by the accompanying claims.







BRIEF DESCRIPTION OF THE DRAWINGS

[0026] The accompanying drawings, which are incorporated in and constitute a part of this specification, illustrate an implementation of the invention and, together with the description, serve to explain the advantages and principles of the invention. In the drawings,


[0027]
FIG. 1 depicts a conventional software development tool;


[0028]
FIG. 2 depicts an overview of a software development tool in accordance with methods and systems consistent with the present invention;


[0029]
FIG. 3 depicts a data structure of the language-neutral representation created by the software development tool of FIG. 2;


[0030]
FIG. 4 depicts representative source code;


[0031]
FIG. 5 depicts the data structure of the language-neutral representation of the source code of FIG. 4;


[0032]
FIG. 6 depicts a data processing system suitable for practicing the present invention;


[0033]
FIG. 7 depicts an architectural overview of the software development tool of FIG. 2;


[0034]
FIG. 8 depicts a flow diagram of the steps performed by the software development tool depicted in FIG. 2;


[0035]
FIGS. 9A and 9B depict a flow diagram illustrating the update model step of FIG. 8;


[0036]
FIG. 10 depicts a flow diagram of the steps performed by the software development tool in FIG. 2 when creating a class;


[0037]
FIG. 11 depicts a user interface displayed by the software development tool depicted in FIG. 2, where the user interface displays a use case diagram of source code;


[0038]
FIG. 12 depicts a user interface displayed by the software development tool depicted in FIG. 2, where the user interface displays both a class diagram and a textual view of source code;


[0039]
FIG. 13 depicts a user interface displayed by the software development tool depicted in FIG. 2, where the user interface displays a sequence diagram of source code;


[0040]
FIG. 14 depicts a user interface displayed by the software development tool depicted in FIG. 2, where the user interface displays a collaboration diagram of source code;


[0041]
FIG. 15 depicts a user interface displayed by the software development tool depicted in FIG. 2, where the user interface displays a statechart diagram of source code;


[0042]
FIG. 16 depicts a user interface displayed by the software development tool depicted in FIG. 2, where the user interface displays an activity diagram of source code;


[0043]
FIG. 17 depicts a user interface displayed by the software development tool depicted in FIG. 2, where the user interface displays a component diagram of source code;


[0044]
FIG. 18 depicts a user interface displayed by the software development tool depicted in FIG. 2, where the user interface displays a deployment diagram of source code;


[0045]
FIG. 19A depicts a user interface displayed by the software development tool depicted in FIG. 2, where the user interface displays a list of predefined criteria which the software development tool checks in the source code;


[0046]
FIG. 19B depicts a user interface displayed by the software development tool depicted in FIG. 2, where the user interface displays the definition of the criteria which the software development tool checks in the source code, and an example of source code which does not conform to the criteria;


[0047]
FIG. 19C depicts a user interface displayed by the software development tool depicted in FIG. 2, where the user interface displays an example of source code which conforms to the criteria which the software development tool checks in the source code;


[0048]
FIGS. 20A and B depict a flow diagram of the steps performed by the software development tool in FIG. 2 when locating source code related to a message from a verification tool;


[0049]
FIG. 21 depicts a user interface displayed by the software development tool depicted in FIG. 2, where the user interface displays a message from a verification tool;


[0050]
FIG. 22 depicts the user interface in FIG. 21 illustrating the selection of a message; and


[0051]
FIG. 23 depicts the user interface in FIG. 22 after the selection of a message.







DETAILED DESCRIPTION OF THE INVENTION

[0052] Methods and systems consistent with the present invention provide an improved software development tool that creates a graphical representation of source code regardless of the programming language in which the code is written. In addition, the software development tool simultaneously reflects any modifications to the source code to both the display of the graphical representation as well as the textual display of the source code.


[0053] As depicted in FIG. 2, source code 202 is being displayed in both a graphical form 204 and a textual form 206. In accordance with methods and systems consistent with the present invention, the improved software development tool generates a transient meta model (TMM) 200 which stores a language-neutral representation of the source code 202. The graphical 204 and textual 206 representations of the source code 202 are generated from the language-neutral representation in the TMM 200. Alternatively, the textual view 206 of the source code may be obtained directly from the source code file. Although modifications made on the displays 204 and 206 may appear to modify the displays 204 and 206, in actuality all modifications are made directly to the source code 202 via an incremental code editor (ICE) 208, and the TMM 200 is used to generate the modifications in both the graphical 204 and the textual 206 views from the modifications to the source code 202.


[0054] The improved software development tool provides simultaneous round-trip engineering, i.e., the graphical representation 204 is synchronized with the textual representation 206. Thus, if a change is made to the source code 202 via the graphical representation 204, the textual representation 206 is updated automatically. Similarly, if a change is made to the source code 202 via the textual representation 206, the graphical representation 204 is updated to remain synchronized. There is no repository, no batch code generation, and no risk of losing code.


[0055] The data structure 300 of the language-neutral representation is depicted in FIG. 3. The data structure 300 comprises a Source Code Interface (SCI) model 302, an SCI package 304, an SCI class 306, and an SCI member 308. The SCI model 302 is the source code organized into packages. The SCI model 302 corresponds to a directory for a software project being developed by the user, and the SCI package 304 corresponds to a subdirectory. The software project comprises the source code in at least one file that is compiled to form a sequence of instructions to be run by a data processing system. The data processing system is discussed in detail below. As is well known in object-oriented programming, the class 306 is a category of objects which describes a group of objects with similar properties (attributes), common behavior (operations or methods), common relationships to other objects, and common semantics. The members 308 comprise attributes and/or operations.


[0056] For example, the data structure 500 for the source code 400 depicted in FIG. 4 is depicted in FIG. 5. UserInterface 402 is defined as a package 404. Accordingly, UserInterface 402 is contained in SCI package 502. Similarly, Bank 406, which is defined as a class 408, is contained in SCI class 504, and Name 410 and Assets 412, which are defined as attributes (strings 414), are contained in SCI members 506. Since these elements are in the same project, all are linked. The data structure 500 also identifies the language in which the source code is written 508, e.g., the Java™ programming language.


[0057]
FIG. 6 depicts a data processing system 600 suitable for practicing methods and systems consistent with the present invention. Data processing system 600 comprises a memory 602, a secondary storage device 604, an I/O device 606, and a processor 608. Memory 602 includes the improved software development tool 610. The software development tool 610 is used to develop a software project 612, and create the TMM 200 in the memory 602. The project 612 is stored in the secondary storage device 604 of the data processing system 600. One skilled in the art will recognize that data processing system 600 may contain additional or different components.


[0058] Although aspects of the present invention are described as being stored in memory, one skilled in the art will appreciate that these aspects can also be stored on or read from other types of computer-readable media, such as secondary storage devices, like hard disks, floppy disks or CD-ROM; a carrier wave from a network, such as Internet; or other forms of RAM or ROM either currently known or later developed.


[0059]
FIG. 7 illustrates an architectural overview of the improved software development tool 610. The tool 610 comprises a core 700, an open application program interface (API) 702, and modules 704. The core 700 includes a parser 706 and an ICE 208. The parser 706 converts the source code into the language-neutral representation in the TMM, and the ICE 208 converts the text from the displays into source code. There are three main packages composing the API 702: Integrated Development Environment (IDE) 708; Read-Write Interface (RWI) 710; and Source Code Interface (SCI) 712. Each package includes corresponding subpackages. As is well known in the art, a package is a collection of attributes, notifications, operations, or behaviors that are treated as a single module or program unit.


[0060] IDE 708 is the API 702 needed to generate custom outputs based on information contained in a model. It is a read-only interface, i.e., the user can extract information from the model, but not change the model. IDE 708 provides the functionality related to the model's representation in IDE 708 and interaction with the user. Each package composing the IDE group has a description highlighting the areas of applicability of this concrete package. RWI 710 enables the user to go deeper into the architecture. Using RWI 710, information can be extracted from and written to the models. RWI not only represents packages, classes and members, but it may also represent different diagrams (class diagrams, use case diagrams, sequence diagrams and others), links, notes, use cases, actors, states, etc.


[0061] SCI 712 is at the source code level, and allows the user to work with the source code almost independently of the language being used.


[0062] The improved software development tool of the present invention is used to develop source code in a project. The project comprises a plurality of files and the source code of a chosen one of the plurality of files is written in a given language. The software development tool determines the language of the source code of the chosen file, converts the source code from the language into a language-neutral representation, uses the language-neutral representation to textually display the source code of the chosen file in the language, and uses the language-neutral representation to display a graphical representation of at least a portion of the project. The source code and the graphical representation are displayed simultaneously.


[0063] The improved software development tool of the present invention is also used to develop source code. The software development tool receives an indication of a selected language for the source code, creates a file to store the source code in the selected language, converts the source code from the selected language into a language-neutral representation, uses the language-neutral representation to display the source code of the file, and uses the language-neutral representation to display a graphical representation of the file. Again, the source code and the graphical representation are displayed simultaneously.


[0064] Moreover, if the source code in the file is modified, the modified source code and a graphical representation of at least a portion of the modified source code are displayed simultaneously. The QA module of the software development tool provides an error message if the modification does not conform to predefined or user-defined styles, as described above. The modification to the source code may be received by the software development tool via the programmer editing the source code in the textual pane or the graphical pane, or via some other independent software tool that the programmer uses to modify the code. The graphical representation of the project may be in Unified Modeling Language; however, one skilled in the art will recognize that other graphical representations of the source code may be displayed. Further, although the present invention is described and shown using the various views of the UML, one of ordinary skill in the art will recognize that other views may be displayed.


[0065]
FIG. 8 depicts a flow diagram of the steps performed by the software development tool to develop a project in accordance with methods and systems consistent with the present invention. As previously stated, the project comprises a plurality of files. The developer either uses the software development tool to open a file that contains existing source code, or to create a file in which the source code will be developed. If the software development tool is used to open the file, determined in step 800, the software development tool initially determines the programming language in which the code is written (step 802). The language is identified by the extension of the file, e.g., “java” identifies source code written in the Java™ language, while “.cpp” identifies source code written in C++. The software development tool then obtains a template for the current programming language, i.e., a collection of generalized definitions for the particular language that can be used to build the data structure (step 804). For example, the templates used to define a new Java™ class contains a default name, e.g., “Class1,” and the default code, “public class Class1 {}.” Such templates are well known in the art. For example, the “Microsoft Foundation Class Library” and the “Microsoft Word Template For Business Use Case Modeling” are examples of standard template libraries from which programmers can choose individual template classes. The software development tool uses the template to parse the source code (step 806), and create the data structure (step 808). After creating the data structure or if there is no existing code, the software development tool awaits an event, i.e., a modification or addition to the source code by the developer (step 810). If an event is received and the event is to close the file (step 812), the file is saved (step 814) and closed (step 816). Otherwise, the software development tool performs the event (step 818), i.e., the tool makes the modification. The software development tool then updates the TMM or model (step 820), as discussed in detail below, and updates both the graphical and the textual views (step 822).


[0066]
FIGS. 9A and 9B depict a flow diagram illustrating the update model step of FIG. 8. The software development tool selects a file from the project (step 900), and determines whether the file is new (step 902), whether the file has been updated (step 904), or whether the file has been deleted (step 906). If the file is new, the software development tool adds the additional symbols from the file to the TMM (step 908). To add the symbol to the TMM, the software development tool uses the template to parse the symbol to the TMM. If the file has been updated, the software development tool updates the symbols in the TMM (step 910). Similar to the addition of a symbol to the TMM, the software development tool uses the template to parse the symbol to the TMM. If the file has been deleted, the software development tool deletes the symbols in the TMM (step 912). The software development tool continues this analysis for all files in the project. After all files are analyzed (step 914), any obsolete symbols in the TMM (step 916) are deleted (step 918).


[0067]
FIG. 10 depicts a flow diagram illustrating the performance of an event, specifically the creation of a class, in accordance with methods and systems consistent with the present invention. After identifying the programming language (step 1000), the software development tool obtains a template for the language (step 1002), creates a source code file in the project directory (step 1004), and pastes the template onto the TMM (step 1006). The project directory corresponds to the SCI model 302 of FIG. 3. Additional events which a developer may perform using the software development tool include the creation, modification or deletion of packages, projects, attributes, interfaces, links, operations, and the closing of a file.


[0068] Applications to be developed using the software development tool are collectively broken into three views of the application: the static view, the dynamic view, and the functional view. The static view is modeled using the use-case and class diagrams. A use case diagram 1100, depicted in FIG. 11, shows the relationship among actors 1102 and use cases 1104 within the system 1106. A class diagram 1200, depicted in FIG. 12 with its associated source code 1202, on the other hand, includes classes 1204, interfaces, packages and their relationships connected as a graph to each other and to their contents.


[0069] The dynamic view is modeled using the sequence, collaboration and statechart diagrams. As depicted in FIG. 13, a sequence diagram 1300 represents an interaction, which is a set of messages 1302 exchanged among objects 1304 within a collaboration to effect a desired operation or result. In a sequence diagram 1300, the vertical dimension represents time and the horizontal dimension represents different objects. A collaboration diagram 1500, depicted in FIG. 15, is also an interaction with messages 1502 exchanged among objects 1504, but it is also a collaboration, which is a set of objects 1504 related in a particular context. Contrary to sequence diagrams 1300 (FIG. 13), which emphasize the time ordering of messages along the vertical axis, collaboration diagrams 1400 (FIG. 14) emphasize the structural organization of objects.


[0070] A statechart diagram 1500 is depicted in FIG. 15. The statechart diagram 1500 includes the sequences of states 1502 that an object or interaction goes through during its life in response to stimuli, together with its responses and actions. It uses a graphic notation that shows states of an object, the events that cause a transition from one state to another, and the actions that result from the transition.


[0071] The functional view can be represented by activity diagrams 1600 and more traditional descriptive narratives such as pseudo code and minispecifications. An activity diagram 1600 is depicted in FIG. 16, and is a special case of a state diagram where most, if not all, of the states are action states 1602 and where most, if not all, of the transitions are triggered by completion of the actions in the source states. Activity diagrams 1600 are used in situations where all or most of the events represent the completion of internally generated actions.


[0072] There is also a fourth view mingled with the static view called the architectural view. This view is modeled using package, component and deployment diagrams. Package diagrams show packages of classes and the dependencies among them. Component diagrams 1700, depicted in FIG. 17, are graphical representations of a system or its component parts. Component diagrams 1700 show the dependencies among software components, including source code components, binary code components and executable components. As depicted in FIG. 18, Deployment diagrams 1800 are used to show the distribution strategy for a distributed object system. Deployment diagrams 1800 show the configuration of run-time processing elements and the software components, processes and objects that live on them.


[0073] Although discussed in terms of class diagrams, one skilled in the art will recognize that the software development tool of the present invention may support these and other graphical views.


[0074] Quality Assurance Module


[0075] There are a variety of modules 704 in the software development tool 610 of the present invention. Some of the modules 704 access information to generate graphical and code documentation in custom formats, export to different file formats, or develop patterns. The software development tool also includes a quality assurance (QA) module which monitors the modifications to the source code and calculates various complexity metrics, i.e., various measurements of the program's performance or efficiency, to support quality assurance. The types of metrics calculated by the software development tool include basic metrics, cohesion metrics, complexity metrics, coupling metrics, Halstead metrics, inheritance metrics, maximum metrics, polymorphism metrics, and ratio metrics. Examples of these metrics with their respective definitions are identified in Tables 1-9 below.
1TABLE 1Basic MetricsBasic MetricsDescriptionLines Of CodeCounts the number of code lines. The user determineswhether to include comments and blank lines.Number OfCounts the number of attributes. The user determinesAttributeswhether to include inherited attributes. Inheritedattributes may be counted. If a class has a high number ofattributes, it may be appropriate to divide it intosubclasses.Number OfCounts the number of classes.ClassesNumber ofCounts the number of constructors. The user determinesConstructorswhether to include all constructors, or to limit thecount to public constructors, protected constructors, etc.Number OfCounts the number of imported packages/classes.ImportThis measure can highlight excessive importing,Statementsand also can be used as a measure of coupling.Number OfCounts the number of members, i.e., attributesMembersand operations. The user determines whether toinclude inherited members. If a class has a high numberof members, it may be appropriate to divide it intosubclasses.Number OfCounts the number of operations. The user determinesOperationswhether to include inherited operations. If a classhas a high number of operations, it may be appropriateto divide it into subclasses.


[0076]

2





TABLE 2










Cohesion Metrics








Cohesion



Metrics
Description





Lack Of
Takes each pair of methods in a class and determines


Cohesion Of
a set of fields accessed by each of them. If the pair


Methods 1
has disjoint sets of field accesses, the value for P is



incremented by one. If the pair shares at least one field



access, then the value for Q is incremented by one.



After considering each pair of methods:



RESULT = (P > Q) ? (P − Q): 0



A low value indicates high coupling between methods,



which indicates potentially low reusability and



increased testing because many methods can affect



the same attributes.


Lack Of
Counts the percentage of methods that do not access


Cohesion Of
a specific attribute averaged over all attributes in


Methods 2
the class. A high value of cohesion (a low lack of cohesion)



implies that the class is well designed. A cohesive class will



tend to provide a high degree of encapsulation, whereas



a lack of cohesion decreases encapsulation and increases



complexity.


Lack Of
Measures the dissimilarity of methods in a class by


Cohesion Of
attributes.


Methods 3
If m = number of methods in a class



 a = number of attributes in a class



 mA = number of methods that access an attribute



 EmA = sum of mA for each attribute



Then RESULT = 100 * (EmA/a − m) / (1 − m)



A low value indicates good class subdivision, which implies



simplicity and high reusability. A high lack of cohesion



increases complexity, thereby increasing the likelihood



of errors during the development process.










[0077]

3





TABLE 3










Complexity Metrics








Complexity



Metrics
Description





Attribute
Defined as the sum of each attribute's value in the class.


Complexity
The value is evaluated as:














boolean
1
Void
3
Long
3



byte
1
Boolean
3
Number
3



char
1
Byte
3
Float
3



short
1
Character
3
Double
3



int
1
String
3
array
3



long
1
StringBuffer
3
java.lang.*
5



float
2
Short
3
Vector
7



double
2
Integer
3
others
9








Cyclomatic
Represents the cognitive complexity of the class. It counts


Complexity
the number of possible paths through an algorithm by



counting the number of distinct regions on a flowgraph,



i.e., the number of ‘if,’ ‘for’ and ‘while’ statements in



the operation's body. The user determines whether to



include case labels of switch statement.


Number Of
Processes all of the methods and constructors, and counts


Remote
the number of different remote methods called. A remote


Methods
method is defined as a method which is not declared in



either the class itself or its ancestors.


Response
Calculated as ‘Number of Local Methods’ + ‘Number


For Class
of Remote Methods.’ The size of the response set for the



class includes methods in the class’ inheritance



hierarchy and methods that can be invoked on other



objects. A class which provides a larger response set



is considered to be more complex and requires more



testing than one with a smaller overall design



complexity.


Weighted
The sum of the complexity of all methods for a class,


Methods Per
where each method is weighted by its cyclomatic


Class 1
complexity. The number of methods and the



complexity of the methods involved is a predictor of



how much time and effort is required to develop



and maintain the class. Methods specified in



a class are included, i.e., methods inherited from



a parent are excluded.


Weighted
Measures the complexity of a class, assuming that a class


Methods Per
with more methods than another is more complex, and that


Class 2
a method with more parameters than another is also likely



to be more complex. Methods specified in a class are



included, i.e., methods inherited from a parent are



excluded.










[0078]

4





TABLE 4










Coupling Metrics








Coupling



Metrics
Description





Coupling
Represents the number of other classes to which a class is


Between
coupled. Counts the number of reference types that are used


Objects
in attribute declarations, formal parameters, return types,



throws declarations and local variables, and types from



which attribute and method selections are made.



Primitive types, types from java.lang package, and



supertypes are not counted. Excessive coupling between



objects is detrimental to modular design and prevents



reuse. The more independent a class is, the easier it



is to reuse it in another application. In order to



improve modularity and promote encapsulation, inter-



object class couples should be kept to a minimum. The



larger the number of couples, the higher the sensitivity



to changes in other parts of the design, and therefore



maintenance is more difficult. A measure of coupling is



useful to determine how complex the testing of various



parts of a design is likely to be. The higher the inter-



object class coupling, the more rigorous the testing



needs to be.


Coupling
The fraction having the number of non-inheritance


Factor
couplings as a numerator and the maximum possible



number of couplings in a system as a denominator.



This measure is from the Metrics for Object-



Oriented Development suite.


Data
Counts the number of reference types used in the attribute


Abstraction
declarations. Primitive types, types from java.lang


Coupling
package and super types are not counted.


FanOut
Counts the number of reference types that are used in



attribute declarations, formal parameters, return types,



throws declarations, and local variables. Simple types and



super types are not counted.










[0079]

5





TABLE 5










Halstead Metrics








Halstead



Metrics
Description





Halstead
This measure is one of the Halstead Software Science


Difficulty
metrics. It is calculated as (‘Number of Unique



Operators’ / ‘Number of Unique Operands’) *



(‘Number of Operands’ / ‘Number of Unique



Operands’).


Halstead
This measure is one of the Halstead Software Science


Effort
metrics. It is calculated as ‘Halstead Difficulty’ *



‘Halstead Program Volume.’


Halstead Program
This measure is one of the Halstead Software Science


Length
metrics. It is calculated as ‘Number of



Operators’ + ‘Number of Operands.'


Halstead Program
This measure is one of the Halstead Software Science


Vocabulary
metrics. It is calculated as ‘Number of Unique



Operators’ + ‘Number of Unique Operands.’


Halstead Program
This measure is one of the Halstead Software Science


Volume
metrics. It is calculated as ‘Halstead Program



Length’ * Log2(‘Halstead Program Vocabulary’).


Number Of
This measure is used as an input to the Halstead


Operands
Software Science metrics. It counts the number of



operands used in a class


Number Of
This measure is used as an input to the Halstead


Operators
Software Science metrics. It counts the number of



operators used in a class


Number Of
This measure is used as an input to the Halstead


Unique
Software Science metrics. It counts the number of


Operands
unique operands used in a class.


Number Of
This measure is used as an input to the Halstead


Unique
Software Science metrics. It counts the number of


Operators
unique operators used in a class.










[0080]

6





TABLE 6










Incapsulation Metrics








Incapsulation



Metrics
Description





Attribute Hiding
The fraction having the sum of the invisibilities of all


Factor
attributes defined in all classes as a numerator, and the



total number of attributes defined in the project as a



denominator. The invisibility of an attribute is the



percentage of the total classes from which this attribute



is not visible. This measure is from the Metrics for



Object-Oriented Development suite.


Method Hiding
The fraction having the sum of the invisibilities of all


Factor
methods defined in all classes as a numerator, and the



total number of methods defined in the project as a



denominator. The invisibility of a method is the



percentage of the total classes from which this



method is not visible. This measure is from the



Metrics for Object-Oriented Development suite.










[0081]

7





TABLE 7










Inheritance Metrics








Inheritance



Metrics
Description





Attribute
The fraction having the sum of inherited attributes in all


Inheritance
classes in the project as a numerator, and the total


Factor
number of available attributes (locally defined plus



inherited) for all classes as a denominator. This measure is



from the Metrics for Object-Oriented Development suite.


Depth Of
Counts how far down the inheritance hierarchy a class or


Inheritance
interface is declared. High values imply that a class is quite


Hierarchy
specialized.


Method
The fraction having the sum of inherited methods in all


Inheritance
classes in the project as a numerator, and the total


Factor
number of available methods (locally defined plus



inherited) for all classes as a denominator. This



measure is from the Metrics for Object-Oriented



Development suite.


Number Of
Counts the number of classes which inherit from a


Child
particular class, i.e., the number of classes in the


Classes
inheritance tree down from a class. A non-zero value



indicates that the particular class is being re-used.



The abstraction of the class may be poor if there



are too many child classes. A high value of this measure



points to the definite amount of testing required for each



child class.










[0082]

8





TABLE 8










Maximum Metrics








Maximum



Metrics
Description





Maximum
Counts the maximum depth of ‘if,’ ‘for’ and ‘while’


Number Of
branches in the bodies of methods. Logical units with a


Levels
large number of nested levels may need implementation



simplification and process improvement because groups



that contain more than seven pieces of information are



increasingly harder for people to understand in problem



solving.


Maximum
Displays the maximum number of parameters among all


Number Of
class operations. Methods with many parameters tend


Parameters
to be more specialized and, thus, are less likely to



be reusable.


Maximum
Counts the maximum size of the operations for a class.


Size Of
Method size is determined in terms of cyclomatic


Operation
complexity, i.e., the number of ‘if,’ ‘for’ and



‘while’ statements in the body of the operation. The user



determines whether to include case labels of switch



statement.










[0083]

9





TABLE 9










Polymorphism Metrics








Polymorphism



Metrics
Description





Number Of
Counts the number of operations added by a class.


Added
Inherited and overridden operations are not counted.


Methods
Classes without parents are not processed. A large



value of this measure indicates that the functionality



of the given class becomes increasingly distinct from



that of the parent classes. In this case, it should be



considered whether this class genuinely should be



inheriting from the parent, or if it could be broken



down into several smaller classes.


Number Of
Counts the number of inherited operations which a class


Overridden
overrides. Classes without parents are not processed.


Methods
High values tend to indicate design problems, i.e.,



subclasses should generally add to and extend the



functionality of the parent classes rather than



overriding them.


Polymorphism
This measure is from the Metrics for Object-Oriented


Factor
Development suite, and is calculated as a fraction.



The numerator is the sum of the overriding methods in all



classes. This is the actual number of possible different



polymorphic situations. A given message sent to a class



can be bound, statically or dynamically, to a named



method implementation. The latter can have as many



shapes (morphos) as the number of times this same



method is overridden in that class’ descendants.



The denominator represents the maximum number of



possible distinct polymorphic situations for that



class as the sum for each class of the number of new



methods multiplied by the number of descendants. This



maximum would be the case where all new methods



defined in each class would be overridden in all of



their derived classes..










[0084]

10





TABLE 10










Ratio Metrics








Ratio Metrics
Description





Comment Ratio
Counts the ratio of comments to total lines of code



including comments. The user determines whether to



include blank lines as part of the total lines of code.


Percentage Of
Counts the percentage of package members in a class.


Package


Members


Percentage Of
Counts the percentage of private members in a class.


Private


Members


Percentage Of
Counts the percentage of protected members in a class.


Protected


Members


Percentage Of
Counts the proportion of vulnerable members in a class.


Public
A large proportion of such members means that the class


Members
has high potential to be affected by external classes



and means that increased efforts will be needed to



test such a class thoroughly.


True Comment
Counts the ratio of comments to total lines of code


Ratio
excluding comments. The user determines whether to



include blank lines as part of the total lines of code.










[0085] The QA module also provides audits, i.e., the module checks for conformance to predefined or user-defined styles. The types of audits provided by the module include coding style, critical errors, declaration style, documentation, naming style, performance, possible errors and superfluous content. Examples of these audits with their respective definitions are identified in Tables 10-17 below.
11TABLE 11Coding Style AuditsCoding Style AuditsDescriptionAvoid ComplexWhen using the comma operator in theInitialization orinitialization or update clause of aUpdate Clause infor statement, avoid the complexity of For Loopsusing more than three variables.Avoid ImplementationThis rule helps you avoid referencingPackages Referencingpackages that normally should not bereferenced.Access Of StaticStatic members should be referenced throughMembers Throughclass names rather than through objects.ObjectsAssignment To FormalFormal parameters should not be assigned.ParametersAvoid Too Long FilesAccording to Sun Code Conventions for Java,files longer than 2000 lines arecumbersome and should be avoided.Avoid Too Long LinesAccording to Sun Code Conventions for Java,lines longer than 80 characters should beavoided, since they're not handled wellby many terminals and tools.Complex AssignmentChecks for the occurrence of multipleassignments and assignments to variableswithin the same expression. Complexassignments should be avoided since theydecrease program readability.Don't Code NumericalAccording to Sun Code Conventions for Java,Constants Directlynumerical constants (literals) should notbe coded directly, except for -1, 0,and 1, which can appear in a for loop ascounter values.Don't Place MultipleAccording to Sun Code Conventions for Java,Statements on theeach line should contain at most oneSame Linestatement.Don't Use theThe negation operator slows down theNegation Operatorreadability of the program. Thus, itFrequentlyis recommended that it not be used frequently.Operator ‘?:’ May NotThe operator ‘?:’ makes the codeBe Usedharder to read than the alternative form withan if-statement.ParenthesizeAccording to Sun Code Conventions for Java,Conditional Part ofif an expression containing a binary operatorTernary Conditionalappears before the ? in the ternary ? :Expressionoperator, it should be parenthesized.Put Declarations OnlySun Code Conventions for Java recommendsat the Beginning ofto put declarations only at the beginningBlocksof blocks. (A block is any code surroundedby curly braces “{” and “}”.) Don't wait todeclare variables until their first use;it can confuse the unwary programmer andhamper code portability within the scope.Provide Incremental InChecks if the third argument of theFor-Statement or use‘for’-statement is missing.while-statementReplacement ForDemand import-declarations must be replacedDemand Importsby a list of single import-declarationsthat are actually imported into thecompilation unit. In other words,import-statements may not endwith an asterisk.Switch StatementAccording to Sun Code Conventions for Java,Should Include aevery switch statement should include aDefault Casedefault case.Use AbbreviatedUse the abbreviated assignment operator inAssignment Operatororder to write programs more rapidly. Alsosome compilers run faster with theabbreviated assignment operator.Use ‘this’ ExplicitlyTries to make the developer use ‘this’To Access Classexplicitly when trying to access classMembersmembers. Using the same class member nameswithg parameter names often makes what thedeveloper is referring to unclear.


[0086]

12





TABLE 12










Critical Errors Audits








Critical Errors



Audits
Description





Avoid Hiding
Detects when attributes declared in child classes


Inherited Attributes
hide inherited attributes.


Avoid Hiding
Detects when inherited static operations are


Inherited Static
hidden by child classes.


Methods


Command Query
Prevents methods that return a value from a


Separation
modifying state. The methods used to query



the state of an object must be different



from the methods used to perform commands



(change the state of the object).


Hiding Of Names
Declarations of names should not hide other



declarations of the same name.


Inaccessible
Overload resolution only considers


Constructor Or
constructors and methods that are visible at


Method Matches
the point of the call. If, however, all the



constructors and methods were considered, there



may be more matches. This rule is violated in



this case. Imagine that ClassB is in a different



package than ClassA. Then the allocation of



ClassB violates this rule since the second



constructor is not visible at the point of the



allocation, but it still matches the allocation



(based on signature). Also the call to open in



ClassB violates this rule since the second and



the third declarations of open are not visible



at the point of the call, but it still matches



the call (based on signature).


Multiple Visible
Multiple declarations with the same name must


Declarations With
not be simultaneously visible except for


Same Name
overloaded methods.


Overriding a Non-
Checks for abstract methods overriding


Abstract Method With
non-abstract methods in a subclass.


an Abstract Method


Overriding a Private
A subclass should not contain a method with


Method
the same name and signature as in a superclass



if these methods are declared to be private.


Overloading Within a
A superclass method may not be overloaded


Subclass
within a subclass unless all overloading in the



superclass are also overridden in the subclass.



It is very unusual for a subclass to be



overloading methods in its superclass without



also overriding the methods it is overloading.



More frequently this happens due to inconsistent



changes between the superclass and subclass -



i.e., the intention of the user is to override



the method in the superclass, but due to the error,



the subclass method ends up overloading the



superclass method.


Use of Static Attribute
Non-final static attributes should not be used


for Initialization
in initializations of attributes.










[0087]

13





TABLE 13










Declaration Style Audits








Declaration Style



Audits
Description





Badly Located Array
Array declarators must be placed next to the type


Declarators
their descriptor of component type.


Constant Private
Private attributes that never get their values


Attributes Must Be
changed must be declared final. By explicitly


Final
declaring them in such a way, a reader of the



source code get some information of how the



attribute is supposed to be used.


Constant Variables
Local variables that never get their values


Must Be Final
changed must be declared final. By explicitly



declaring them in such a way, a reader of the



source code obtains information about how the



variable is supposed to be used.


Declare Variables In
Several variables (attributes and local variables)


One Statement Each
should not be declared in the same statement.


Instantiated Classes
This rule recommends making all instantiated


Should Be Final
classes final. It checks classes which are



present in the object model. Classes from



search/classpath are ignored.


List All Public
Enforces a standard to improve readability.


And Package
Methods/data in your class should be ordered


Members First
properly.


Order of Class
According to Sun Code Conventions for Java,


Members Declaration
the parts of a class or interface declaration



should appear in the following order










1.
Class (static) variables. First the




public class variables, then the




protected, then package level (no




access modifier), and




then the private.



2.
Instance variables. First the public class




variables, then the protected, then




package level (no access modifier),




and then the private.



3.
Constructors



4.
Methods








Order Of
Checks for correct ordering of modifiers. For


Appearance
classes, this includes visibility (public,


Of Modifiers
protected or private), abstract, static,



final. For attributes, this includes visibility



(public, protected or private), static, final,



transient, volatile. For operations, this



includes visibility (public, protected or private),



abstract, static, final, synchronized, native.


Put the Main
Tries to make the program comply with various


Function Last
coding standards regarding the form of the class



definitions.


Place Public
According to Sun Code Conventions for Java,


Class First
the public class or interface should be the



first class or interface in the file.










[0088]

14





TABLE 14










Documentation Audits








Documentation



Audits
Description





Bad Tag In JavaDoc
This rule verifies code against accidental


Comments
use of improper JavaDoc tags.


Distinguish Between
Checks whether the JavaDoc comments in your


JavaDoc And Ordinary
program ends with ‘**/’ and ordinary C-style


Comments
ones with ‘*/.’


Provide File
According to Sun Code Conventions for Java, all


Comments
source files should begin with a c-style comment



that lists the class name, version information,



date, and copyright notice.


Provide JavaDoc
Checks whether JavaDoc comments are provided


Comments
for classes, interfaces, methods and attributes.



Options allow to specify whether to check



JavaDoc comments for public, package,



protected or all classes and members.










[0089]

15





TABLE 15










Naming Style Audits








Naming Style Audits
Description


Class Name Must
Checks whether top level classes or interfaces


Match Its File Name
have the same name as the file in which they



reside.


Group Operations
Enforces standard to improve readability.


With Same Name


Together


Naming Conventions
Takes a regular expression and item name and



reports all occurrences where the pattern does



not match the declaration.


Names Of Exception
Names of classes which inherit from Exception


Classes
should end with Exception.


Use Conventional
One-character local variable or parameter names


Variable Names
should be avoided, except for temporary and



looping variables, or where a variable holds an



undistinguished value of a type.










[0090]

16





TABLE 16










Performance Audits








Performance Audits
Description





Avoid Declaring
This rule recommends declaring local variables


Variables Inside Loops
outside the loops since declaring variables



inside the loop is less efficient.


Append To String
Performance enhancements can be obtained by


Within a Loop
replacing String operations with StringBuffer



operations if a String object is appended within



a loop.


Complex Loop
Avoid using complex expressions as repeat


Expressions
conditions within loops.










[0091]

17





TABLE 17










Possible Error Audits








Possible Error Audits
Description





Avoid Empty Catch
Catch blocks should not be empty.


Blocks
Programmers frequently forget to process



negative outcomes of a program and tend to



focus more on the positive outcomes.



When ‘Check parameter usage’ option is



on, this rule also checks, whether code does



something with the exception parameter or



not. If not, violation is raised.



You can also specify the list of exceptions,



which should be ignored. For example, for



PropertyVetoException catch block



usually is empty - as a rule, the program just



does nothing if this exception occurs.


Avoid Public And
Declare the attributes either private or protected,


Package Attributes
and provide operations to access or change them.


Avoid Statements
If a statement with an empty body exists in the


With Empty Body
code, the software development tool will display



this error message when an audit is performed


Assignment To For-
‘For’-loop variables should not be assigned.


Loop Variables


Don't Compare
Avoid testing for equality of floating point


Floating Point Types
numbers since floating-point numbers that



should be equal are not always equal due to



rounding problems.


Enclosing Body
The statement of a loop must always be a block.


Within a Block
The ‘then’ and ‘else’ parts of ‘if’-statements



must always be blocks. This makes it easier to



add statements without accidentally introducing



bugs in case the developer forgets to add braces.


Explicitly Initialize
Explicitly initialize all variables. The only reason


All Variables
not to initialize a variable is where it's declared



is if the initial value depends on some



computation occurnng first.


Method finalize( )
Calling of super.finalize( ) from finalize( )


Doesn't Call
is good practice of programming, even if the base


super.finalize( )
class doesn't define the finalize( ) method.



This makes class implementations less dependent



on each other.


Mixing Logical
An expression containing multiple logical


Operators Without
operators should be parenthesized properly.


Parentheses


No Assignments In
Use of assignment within conditions makes the


Conditional
source code hard to understand.


Expressions


Supply Break or
According to Sun Code Conventions for Java,


Comment in Case
every time a case falls through (doesn't include


Statement
a break statement), a comment should be added



where the break statement would normally be.



The break in the default case is redundant, but it



prevents a fall-through error if later another case



is added.


Use ‘equals’ Instead
The ‘==’ operator used on strings checks if


Of ‘==’
two string objects are two identical objects. In



most situations, however, one likes to simply



check if two strings have the same value. In



these cases, the ‘equals’ method should



be used.


Use ‘L’ Instead Of
It is better to use uppercase ‘L’ to distinguish


‘1’ at the end of
the letter ‘1’ from the number ‘1.’ Thus,


integer constant
if a lowercase “1” is used, the software



development tool will display this error message



when an audit is performed.


Use Of the
The ‘synchronized’ modifier on methods can


‘synchronized’
sometimes cause confusion during maintenance as


Modifier
well as during debugging. This rule therefore



recommends against using this modifier, and



instead recommends using ‘synchronized’



statements as replacements.










[0092]

18





TABLE 18










Superfluous Content Audits








Superfluous Content



Audits
Description





Duplicate Import
There should be at most one import declaration


Declarations
that imports a particular class/package


Don't Import the
No classes or interfaces need to be imported from


Package the Source
the package to which the source code file belongs.


File Belongs To
Everything in that package is available without



explicit import statements.


Explicit Import
If the code calls for explicit import of classes


Of the java.lang
from the package ‘java.lang,’ the software


Classes
development tool will display this error message



when an audit is performed.


Equality Operations
Avoid performing equality operations on Boolean


On Boolean
operands. ‘True’ and ‘false’ literals should


Arguments
not be used in conditional clauses.


Imported Items
It is not legal to import a class or an interface


Must Be Used
and never use it. This rule checks classes and



interfaces that are explicitly imported with their



names - that is not with import of a complete



package, using an asterisk. If unused class and



interface imports are omitted, the amount of



meaningless source code is reduced -



thus the amount of code to be understood by a



reader is minimized.


Unnecessary Casts
Checks for the use of type casts that are not



necessary.


Unnecessary
Verifies that the runtime type of the left-hand


‘instanceof’
side expression is the same as the one specified


Evaluations
on the right-hand side.


Unused Local
Local variables and formal parameter declarations


Variables And
must be used.


Formal


Parameters


Use Of Obsolete
The modifier ‘abstract’ is considered obsolete


Interface Modifier
and should not be used.


Use Of Unnecessary
All interface operations are implicitly public and


Interface Member
abstract. All interface attributes are implicitly


Modifiers
public, final and static.


Unused Private
An unused class member might indicate a logical


Class Member
flaw in the program. The class declaration has



to be reconsidered in order to determine the



need of the unused member(s).


Unnecessary Return
According to Sun Code Conventions for Java,


Statement Parentheses
a return statement with a value should not



use parentheses unless they make the



return value more obvious in some way.










[0093] If the QA module determines that the source code does not conform to the audit and/or the metrics requirements, an error message is provided to the developer. The audit and metrics requirements are well known in software development. For example, as depicted in FIG. 19A, the software development tool checks for a variety of coding styles 1900. If the software development tool were to check for “Access Of Static Members Through Objects” 1902, it would verify whether static members are referenced through class names rather than through objects 1904. Further, as depicted in FIG. 19B, if the software development tool were to check for “Complex Assignment” 1906, the software development tool would check for the occurrence of multiple assignments and assignments to variables within the same expression to avoid complex assignments since these decrease program readability 1908. An example of source code 1910 having a complex assignment is depicted in FIG. 19B, and the corresponding source code 1912 having a non-complex assignment is depicted in FIG. 19C. For example, the complex assignment:




i *=j++




[0094] in the source code 1910 in FIG. 19B can be represented in a non-complex form as follows:




j++






i *=j




[0095] Both the complex and the non-complex formulas perform the same operations, i.e., add 1 to j and multiply j with i. If the complex assignment identified in the source code 1910 in FIG. 19B is used, the software development tool will generate the “Complex Assignment” error message when an audit is performed. If, on the other hand, the non-complex assignment identified in the source code 1912 in FIG. 19C is used, the software development tool will not generate the “Complex Assignment” error message when an audit is performed.


[0096] An example for each of the audits identified above in Tables 11-18 is provided below:


[0097] Coding Style


[0098] Avoid Complex Initialization or Update Clause in For Loops


[0099] When using the comma operator in the initialization or update clause of a for statement, the developer should avoid the complexity of using more than three variables. The following source code illustrates the use of more than three variables in a “for statement”:
19for (i = 0, j =0, k =10, 1=−1; i <cnt;  i++, j++, k--, 1 += 2 ) {  // do something}


[0100] To remedy the complexity of using more than three variables, the source code may be rewritten as follows:
201=−1;for ( i = 0, j=0, k=10; i < cnt;  i++,j++,k−− ) {  // do something  1 += 2;}


[0101] Avoid Implementation Packages Referencing


[0102] This rule helps a developer avoid referencing packages that normally should not be referenced. For example, if the developer uses Facade or AbstractFactory patterns, he or she can make sure that no one uses direct calls to the underlying constructors of the classes.


[0103] The developer can divide his or her packages into interface and implementation packages, and ensure that no one ever refers to the implementation packages, while the interface packages are accessible for reference. The developer can set up two lists of packages: the allowed (interface) and banned (implementation) packages. For each class reference in source code, this rule verifies that the package where this class belongs is in the allowed list and not in the banned list.


[0104] Package names in the list may be:
21‘*’any package is allowed or bannedpackage namethis package is allowed or bannedpackage name postfixed by ‘*’any subpackage of the givenpackage is allowed or banned


[0105] In case of conflict, the narrower rule prevails. For example, if the following list is specifically allowed:


[0106] *


[0107] com.mycompany.openapi. * and the following is banned:


[0108] com.mycompany.*


[0109] In the above example, all subpackages of com.mycompany package are banned except for those belonging to:


[0110] com.mycompany.openapi subpackage.


[0111] Access Of Static Members Through Objects


[0112] Static members should be referenced through class names rather than through objects. For example, the following code is incorrect:
22class AOSMTO1 {  void func () {    AOSMTO1 obj1 = new AOSMTO1();    AOSMTO2 obj2 = new AOSMTO2();    obj1.attr = 10;    obj2.attr = 20;    obj1.oper();    obj2.oper();    this.attr++;    this.oper();  }  static int attr;  static void oper () {}}class AOSMTO2 {  static int attr;  static void oper () {}}


[0113] The following source code corrects the above code so that the static members are referenced via class names:
23class AOSMTO1 {  void func () {    AOSMTO1 obj1 = new AOSMTO1();    AOSMTO2 obj2 = new AOSMTO2();    AOSMTO1.attr = 10;    AOSMTO2.attr = 20;    AOSMTO1.oper();    AOSMTO2.oper();    AOSMTO1.attr++;    AOSMTO1.oper();  }  static int attr;  static void oper () {}}class AOSMTO2 {  static int attr;  static void oper () {}}


[0114] Assignment to Formal Parameters


[0115] Formal parameters should not be assigned values. For example, the following code increments param by 11, and returns the new value for param:
24int oper (int param) {  param += 10;  return ++param;}


[0116] Rather than reassigning the value for param, the following code declares a new variable result, sets result to equal param +11, and returns the value for result:
25int oper (int param) {  int result = param + 10;  return ++result;}


[0117] Avoid Too Long Files


[0118] Files longer than 2000 lines are cumbersome and should be avoided.


[0119] Avoid Too Long Lines


[0120] Lines longer than 80 characters should be avoided, since they are not handled well by many terminals and tools.


[0121] Complex Assignment


[0122] This audit checks for the occurrence of multiple assignments and assignments to variables within the same expression. Complex assignments should be avoided since they decrease program readability.


[0123] If the ‘strict’ option is off, assignments of equal value to several variables in one operation are permitted. For example the following statement would raise violation if ‘strict’ option were on; otherwise there would be no violation:




i=j=k=
0;



[0124] The following source code is an example of a compound assignment, which should be avoided:




i *=j++;






k=j=
10;





l=j+=
15;



[0125] The following source code is an example of a nested assignment, which should be avoided:




i=j+++
20;





i=
(j=25)+30;



[0126] The source code shown above is corrected by breaking the statements into several statements. For example, the following source code:




i *=j++;




[0127] may be replaced by:




j++;






i *=j




[0128] The following code:




k=j=
10;



[0129] may be replaced by:




k=
10;





j=
10;



[0130] The following code:




l=j+=
15;



[0131] may be replaced by:




j+=
15;





l=j;




[0132] The following code:




i=j+++
20;



[0133] may be replaced by:




j++;






i=j+
20;



[0134] The following source code:




i=
(j=25)+30;



[0135] may be replaced by:




j=
25;





i=j+
30;



[0136] Don't Code Numerical Constants Directly


[0137] Numerical constants (literals) should not be coded directly, except for −1, 0, and 1, which can appear in a for loop as counter values. Rather than coding numerical constants directly, add static final attributes for numeric constants.


[0138] Don't Place Multiple Statements on the Same Line


[0139] Each line should contain at most one statement. For example, for the following code:


[0140] if(someCondition) someMethod();




i++; j++;




[0141] each statement should be placed on a separate line, as follows:


[0142] if(someCondition)


[0143] someMethod();




i++;






j++;




[0144] Don't Use the Negation Operator Frequently


[0145] The negation operator slows down the readability of the program, so it is recommended that it should not be used frequently. The following source code illustrates a violation of this rule:
26boolean isOk = verifySomewhat()if( !isOk )  return 0;else  return 1;


[0146] The program logic should be changed to avoid negation:
27boolean isOk = verifySomewhat()if( isOk )  return 1;else  return 0;


[0147] Operator ‘?:’ May Not Be Used


[0148] The operator ‘?:’ makes the code harder to read, than the alternative form with an if-statement. Thus, in the following source code:
28void func (int a) {  int b = (a == 10) ? 20 : 30;}


[0149] The ‘?:’ operator should be replaced with the appropriate if-else statement.
29void func (int a) {  if (a == 10)    b = 20;  else    b = 30;}


[0150] Parenthesize Conditional Part of Ternary Conditional Expression


[0151] If an expression containing a binary operator appears before the “?” in the ternary “?:” operator, it should be parenthesized. Thus, the following code:


return x>=0 ?x:−x;


[0152] should be replaced by:


return (x>=0) ?xL−x;


[0153] Put Declarations Only at the Beginning of Blocks


[0154] Declarations should be placed only at the beginning of blocks. A block is any code surrounded by curly braces “{“and”}”. Waiting to declare variables until their first use can confuse the unwary programmer and hamper code portability within the scope. Thus, in the following source code:
30void myMethod() {  if(condition) {  doSomeWork();  int int2 = 0;  useInt2(int2);}int int1 = 0;useInt1(int1);}


[0155] the declarations should be moved to the beginning of the block, as follows:
31void myMethod() {  int int1 = 0;// beginning of method block  if (condition) {    int int2 = 0;// beginning of “if” block    doSomeWork();    useInt2(int2);  }  useInt1(int1);}


[0156] Provide Incremental In For-Statement or use while-statement


[0157] This audit checks if the third argument of the for-statement is missing, as shown below:
32for ( Enumeration enum = getEnum(); enum.hasMoreElements(); ) {  Object o = enum.nextElement();  doSomeProc(o);}


[0158] Either the incremental part of a for-structure must be provided or the for-statement must be cast into a while-statement, as shown below:
33Enumeration enum = getEnum();while (enum.hasMoreElements()) {  Object o = enum.nextElement();  doSomeProc(o);}


[0159] Replacement For Demand Imports


[0160] Demand import-declarations must be replaced with a list of single import-declarations that are actually imported into the compilation unit. In other words, import-statements may not end with an asterisk. For example, the following source code violates this audit:
34import java.awt.*;import javax.swing.*;class RFDI {  public static JFrame getFrame (Component com) {    while (com != null) {      if (com instanceofJFrame)        return (JFrame)com;      com = com.getParent();    }    return null;  }}


[0161] To remedy the above, the demand imports should be replaced with a list of single import declarations, as shown below:
35import java.awt.Component;import javax.swing.JFrame;class RFDI {  public static JFrame getFrame (Component com) {    while (com != null) {      if (com instanceofJFrame)        return (JFrame)com;      com = com.getParent();    }    return null;  }}


[0162] Switch Statement Should Include a Default Case.


[0163] Every switch statement should include a default case.


[0164] Use Abbreviated Assignment Operator


[0165] The abbreviated assignment operator should be used to write programs more rapidly. This also increases the speed of some compilers. Thus, the following source code:
36void oper () {  int i = 0;  i = i + 20;  i = 30* i;}


[0166] should be replaced by:
37void oper () {  int i = 0;  i += 20;  i *= 30;}


[0167] Use ‘this’ Explicitly To Access Class Members


[0168] ‘This’ should be used explicitly to access class members because using the same class members' and parameters' names makes references confusing. For example, the following source code:
38class UTETACM {  int attr = 10;  void func () {    // do something  }  void oper () {    func();    attr = 20;  }}


[0169] should be replaced by:
39class UTETACM {  int attr = 10;  void func () {    // do something  }  void oper () {    this.func();    this.attr = 20;  }}


[0170] Critical Errors


[0171] Avoid Hiding Inherited Attributes


[0172] This audit detects when attributes declared in child classes hide inherited attributes. Thus, in the following source code:
40class Elephant extends Animal {  int attr1;  // something...;}class Animal {  int attr1;}


[0173] the child class attribute should be renamed, as follows:
41class Elephant extends Animal {  int elphAttr1;  // something...;}class Animal {  int attr1;}


[0174] Avoid Hiding Inherited Static Methods


[0175] This audit detects when inherited static operations are hidden by child classes. Thus, in the following source code:
42class Elephant extends Animal {  void oper1() {}  static void oper2() {}}class Animal {  static void oper1() {}  static void oper2() {}}


[0176] either ancestor or descendant class operations should be renamed, as follows:
43class Elephant extends Animal {  void anOper1 () {}  static void anOper2 () {}}class Animal {  static void oper1() {}  static void oper2() {}}


[0177] Command Query Separation


[0178] This audit prevents methods that return a value from modifying state. The methods used to query the state of an object must be different from the methods used to perform commands (change the state of the object). For example, the following source code violates this audit:
44class CQS {  int attr;  int getAttr () {    attr += 10;    return attr;  }}


[0179] Hiding Of Names


[0180] Declarations of names should not hide other declarations of the same name. The option ‘Formally’ regulates whether hiding of names should be detected for parameter variable, if the only usage of it is to assign its value to the attribute with the same name. Thus, for the following source code:
45class HON {  int index;  void func () {    int index;    // do something  }  void setIndex (int index) {    this.index = index;  }}


[0181] The variable which hides the attribute or another variable should be renamed, as follows:
46class HON {  int index;  void func () {    int index1;    // do something  }  void setIndex (int anIndex) {    this.index = anIndex;  }}


[0182] In the above example, the second violation would be raised only if the “formally” option is switched on.


[0183] Inaccessible Constructor Or Method Matches


[0184] Overload resolution only considers constructors and methods that are visible at the point of the call. If, however, all the constructors and methods were considered, there may be more matches, which would violate this audit.


[0185] For example, in the source code below, if ClassB is in a different package than ClassA, then the allocation of ClassB violates this rule since the second constructor is not visible at the point of the allocation, but it still matches the allocation (based on signature). Also the call to oper in ClassB violates this rule since the second and the third declarations of oper is not visible at the point of the call, but it still matches the call (based on signature).
47public class ClassA {  public ClassA (int param) {}  ClassA (char param) {}  ClassA (short param) {}  public void oper (int param) {}  void oper (char param) {}  void oper (short param) {}}


[0186] Either such methods or constructors must be given equal visibility, or their signature must be changed, as follows:
48public class ClassA {  ClassA (intparam) {}  public ClassA (char param) {}  public ClassA (short param) {}  public void oper (int param) {}  void doOper (char param) {}  void doOper (short param) {}}


[0187] Multiple Visible Declarations With Same Name


[0188] Multiple declarations with the same name must not be simultaneously visible except for overloaded methods. Thus, in the following source code:
49class MVDWSN {  void index () {    return;  }  void func () {    int index;  }}


[0189] The members (or variables) with clashing names should be renamed, as follows:
50class MVDWSN {  void index () {    return;  }  void func () {    int anIndex;  }}


[0190] Overriding a Non-Abstract Method With an Abstract Method


[0191] This audit checks for the overriding of non-abstract methods by abstract methods in a subclass. For example, in the following source code, the non-abstract method “func()” is overridden by the abstract method “func()” in a subclass:
51class Animal {  void func () {}}abstract class Elephant extends Animal {  abstract void func ();}


[0192] To remedy this audit, the method may be renamed, or the method should be made abstract in an ancestor class or non-abstract in a descendant, as follows:
52class Animal {  void func () {}}abstract class Elephant extends Animal {  abstract void extFunc ();}


[0193] Overriding a Private Method


[0194] A subclass should not contain a method with the same name and signature as in a superclass if these methods are declared to be private. Thus, in the following source code:
53class Animal {  private void func () {}}class Elephant extends Animal {  private void func () {}}


[0195] the descendant class' method should be renamed, as follows:
54class Animal {  private void func () {}}class Elephant extends Animal {  private void extFunc () {}}


[0196] Overloading Within a Subclass


[0197] A superclass method may not be overloaded within a subclass unless all overloadings in the superclass are also overridden in the subclass. It is very unusual for a subclass to be overloading methods in its superclass without also overriding the methods it is overloading. More frequently this happens due to inconsistent changes between the superclass and subclass—i.e., the intention of the user is to override the method in the superclass, but due to the error, the subclass method ends up overloading the superclass method. The following source code violates this audit:
55public class Elephant extends Animal {  public void oper (char c) {}  public void oper (Object o) {}}class Animal {  public void oper (int i) {}  public void oper (Object o) {}}


[0198] In the above code, the other methods should also be overloaded, as follows:
56public class Elephant extends Animal {  public void oper (char c) {}  public void oper (int i) {}  public void oper (Object o) {}}class Animal {  public void oper (int i) {}}


[0199] Use of Static Attribute for Initialization


[0200] Non-final static attributes should not be used in initializations of attributes. Thus, in the following source code:
57class ClassA {  static int state = 15;  static int attr1 = state;  static int attr2 = ClassA.state;  static int attr3 = ClassB.state;}class ClassB {  static int state = 25;}


[0201] The static attributes used for initialization should be made final, or another constant should be used for initialization, as follows:
58class ClassA {  static int state = 15;  static final int INITIAL_STATE = 15;  static int attr1 = INITIAL_STATE;  static int attr2 = ClassA.state;  static int attr3 = ClassB.state;}class ClassB {  static final int state = 25;}


[0202] Declaration Style


[0203] Badly Located Array Declarators


[0204] Array declarators must be placed next to the type descriptor of their component type. Thus, the following source code:
59class BLAD {  int attr[];  int oper (int param[]) [] {    int var[][];    // do something  }}


[0205] should be replaced by:
60class BLAD {  int[] attr;  int[] oper (int[] param) {    int[][] var;    // do something  }}


[0206] Constant Private Attributes Must Be Final


[0207] Private attributes that never get their values changed must be declared final. By explicitly declaring them in such a way, a reader of the source code gets some information regarding how the attribute should be used. Thus, in the following source code:
61class CPAMBF {    int attr1 = 10;    int attr2 = 20;  void func () {    attr1 = attr2;    System.out.println(attr1);  }}


[0208] all private attributes that never change should be made final, as follows:
62class CPAMBF {  int attr1 = 10;  final int attr2 = 20;  void func () {    attr1 = attr2;    System.out.println(attr1);  }}


[0209] Constant Variables Must Be Final


[0210] Local variables that never get their values changed must be declared final. By explicitly declaring them in such a way, a reader of the source code gets some information regarding how the variable should be used. Thus, in the following source code:
63void func () {  int var1 = 10;  int var2 = 20;  var1 = var2;    System.out.println(attr1);}


[0211] all variables which are never changed should be made final, as follows:
64void func () {  intvar1 = 10;  final int var2 = 20;  var1 = var2;    System.out.println(attr1);}


[0212] Declare Variables In One Statement Each


[0213] Several variables (attributes and local variables) should not be declared in the same statement. The ‘different types only’ option can weaken this rule. When such option is chosen, violation is raised only when variables are of different types, for example: “int foo, fooarray[];” is definitely wrong. To correct the following source code:
65class DVIOSE {  int attr1;  int attr2, attr3;  void open () {    int var1;    int var2, var3;  }}


[0214] each variable should be declared in separate statements, as follows:
66class DVIOSE {  int attr1;  int attr2;  int attr3;  void open () {    int var1;    int var2;    int var3;  }}


[0215] Instantiated Classes Should Be Final


[0216] This rule recommends making all instantiated classes final. It checks classes which are present in the object model. Classes from search/classpath are ignored. In the following source code:
67class ICSBF {  private Class1 attr1 = new Class1();  // something...}class Class1 {  // something...}


[0217] all instantiated classes should be made final, as follows:
68class ICSBF {  private Class1 attr1 = new Class1();  // something...}final class Class1 {  // something...}


[0218] List All Public And Package Members First


[0219] Enforces standard to improve readability. Methods and/or data in classes should be ordered properly. Thus, in the following source code:
69class LAPAPMF {  private int attr;  public void oper () {}}


[0220] Public and package members should be placed before protected and private ones, as follows:
70class LAPAPMF {  public void oper () {}  private int attr;}


[0221] Order of Class Members Declaration


[0222] The parts of a class or interface declaration should appear in the following order:


[0223] 1. Class (static) variables. First the public class variables, then the protected, then package level (no access modifier), and then the private.


[0224] 2. Instance variables. First the public class variables, then the protected, then package level (no access modifier), and then the private.


[0225] 3. Constructors.


[0226] 4. Methods.


[0227] Order Of Appearance Of Modifiers


[0228] This audit checks for correct ordering of modifiers. For classes, the ordering is: visibility (public, protected or private), abstract, static, final. For attributes, the ordering is: visibility (public, protected or private), static, final, transient, volatile. For operations, the ordering is: visibility (public, protected or private), abstract, static, final, synchronized, native. Thus, the following source code is incorrect:
71final public class OOAOM {  public static final int attr1;  static public int attr2;}


[0229] The order of modifiers above should be changed, as follows:
72public final class OOAOM {  public static final int attr1;  public static int attr2;}


[0230] Put the Main Function Last


[0231] This audit requires that in class definitions, the main function should be placed later in the definition. Thus, the following source code:
73public class PMFL {  void func1 () {}  public static void main (String args[]) {}  void func2 () {}}


[0232] should be modified to:
74public class PMFL {  public static void main (String args[]) {}  void func1 () {}  void func2 () {}}


[0233] Place Public Class First


[0234] The public class or interface should be the first class or interface in the file. Thus, the following source code:
75class Helper {  // some code}public class PPCM {  // some code}


[0235] should be modified to:
76public class PPCM {  // some code}class Helper {  // some code}


[0236] Documentation


[0237] Bad Tag In JavaDoc Comments


[0238] This audit prevents the accidental use of improper JavaDoc tags. The following example illustrates the use of a bad tag:
77package audit;/** Class BTIJDC  * @BAD_TAG_1  * @version 1.0 08-Jan-2000  * @author TogetherSoft  */public class BTIJDC {  /**  * Attribute attr  * @BAD_TAG_2  * @supplierCardinality 0..  * @clientCardinality 1  */  private int attr;  /** Operation oper  * @BAD_TAG_3  * @return int  */  public int oper () {}}


[0239] The misspelled tags in the above code should be replaced, or any non-standard tags should be added to the list of valid tags.


[0240] Distinguish Between JavaDoc And Ordinary Comments


[0241] This audit checks whether JavaDoc comments end with ‘**/’ and ordinary C-style documents end with ‘*/’. Thus, the following code:
78package audit;/***JavaDoc comment*/public class DBJAOC {  /*  *C-style comment  **/  private int attr;  /**  *JavaDoc comment  */  public void oper () {}}


[0242] should be replaced by:
79package audit;/***JavaDoc comment**/public class DBJAOC {  /*  *C-style comment  */  private int attr;  /**  *JavaDoc comment  **/  public void oper () {}}


[0243] Provide File Comments


[0244] All source files should begin with a c-style comment that lists the class name, version information, date, and copyright notice, as follows
80/**Classname*Version information*Date*Copyright notice*/


[0245] This audit verifies whether the file begins with a c-style comment.


[0246] Provide JavaDoc Comments


[0247] This audit checks whether JavaDoc comments are provided for classes, interfaces, methods and attributes.


[0248] Naming Style


[0249] Class Name Must Match Its File Name


[0250] This audit checks whether the top level class and/or interface has the same name as the file in which it resides. Thus, in the following source code:


[0251] // File Audit_CNMMIFN.java


[0252] class CNMMIFN {}


[0253] the class or file should be renamed, as follows:


[0254] // File Audit_CNMMIFN.java


[0255] class Audit_CNMMIFN {}


[0256] Group Operations With Same Name Together


[0257] This audit requires that group operations with the same name be placed together to improve readability. Thus, the following example:
81package audit;class GOWSNT {  void operation () {}  void function () {}  void operation (int param) {}}


[0258] should be modified, as follows:
82package audit;class GOWSNT {  void operation 0 {}  void operation (int param) {}  void function 0 {}}


[0259] Naming Conventions


[0260] This audit takes a regular expression and item name and reports all occurrences where the pattern does not match the declaration. Thus, in the following example,
83package _audit; class _AuditNC {  void operation1 (int Parameter) {  void Operation2 (int parameter) {    int_variable;  }  int my_attribute;  final static int constant;}


[0261] The packages, classes, members etc., should be renamed in a proper way, as follows:
84package audit; class AuditNC {  void operation1 (int parameter) {  void operation2 (int parameter) {    int variable;    }    int myAttribute;    final static int CONSTANT;}


[0262] Names Of Exception Classes


[0263] Names of classes which inherit from Exception should end with Exception. Thus, the following source code:


[0264] class AuditException extends Exception {}


[0265] class NOEC extends Exception {}


[0266] should be modified to renmae the exception classes, as follows:


[0267] class AuditException extends Exception {}


[0268] class NOECException extends Exception {}


[0269] Use Conventional Variable Names


[0270] One-character local variable or parameter names should be avoided, except for temporary and looping variables, or where a variable holds an undistinguished value of a type. Conventional one-character names are:
85b for a bytec for a chard for a doublee for an Exceptionf for a floati, j, k for integersl for a longo for an Objects for a String


[0271] Local variable or parameter names that consist of only two or three uppercase letters should be avoided to avoid potential conflicts with the initial country codes and domain names that are the first component of unique package names.


[0272] The following source code does not give conventional names to all local variables:
86void func (double d) {  int i;    Object o;    Exception e;    char s;    Object f;    String k;    Object UK;  }and should be replaced by:  void func (double d) {    int i;    Object o;    Exception e;    char c;    Object o;    String s;    Object o1;}


[0273] Performance


[0274] Avoid Declaring Variables Inside Loops


[0275] This rule recommends that local variables be declared outside the loops because declaring variables inside the loop is less efficient. Thus, in the following source code:
87int good_var = 0for (int i = 0; i < 100; i++) {  int var1 = 0;  // ...}while (true) {  int var2 = 0;  // ...}do {  int var3 = 0;  // ...} while (true);


[0276] the variable declarations should be moved out of the loop, as follows:
88int good_var = 0;int var1;for (int i = 0; i < 100; i++) {  var1 = 0;  // ...}int var2;while (true) {  var2 = 0;  // ...}int var3;do {  var3 = 0;  // ...} while (true);


[0277] Append To String Within a Loop


[0278] Performance enhancements can be obtained by replacing String operations with StringBuffer operations if a String object is appended within a loop. Thus, in the following example source code:
89public class ATSWL {  public String func () {    String var = “var”;    for (int i = 0; i < 10; i++) {      var += (“” + i);    }    return var;  }}


[0279] StringBuffer class should be used instead of String, as follows:
90public class ATSWL {  public String func () {    StringBuffer var = new StringBuffer(“var”);    for (int i = 0; i < 10; i++) {      var.append(“” + i);    }    return var.toString();  }}


[0280] Complex Loop Expressions


[0281] Avoid using complex expressions as repeat conditions within loops. The following source code violates this audit by using “vector.size()” within a condition of a “for” loop:
91void oper () {  for (int i = 0; i <vector.size(); i++) {    // do something  }  int size = vector.size();  for (int i = 0; i <size; i++) {    // do something  }}


[0282] In the above code, the expression “vector.size()” should be assigned to a variable before the loop, and that variable should be used in the loop, as follows:
92void oper () {  int size = vector.size();  for (int i = 0; i < size; i++) {    // do something  }  int size = vector.size();  for (int i = 0; i < size; i++) {    // do something  }}


[0283] Possible Errors


[0284] Avoid Empty Catch Blocks


[0285] Catch blocks should not be empty. Programmers frequently forget to process negative outcomes of a program and tend to focus more on the positive outcomes.


[0286] When the ‘Check parameter usage’ option is chosen, this rule also checks whether the code does something with the exception parameter or not. If not, a violation is raised.


[0287] Avoid Public And Package Attributes


[0288] Public and package attributes should be avoided. Rather, the attributes should be declared either private or protected, and operations should be provided to access or change the attribute declarations.
93class APAPA {  int attr1;  public int attr2;}


[0289] The visibility of attributes should be changed to either private or protected, and access operations for these attributes should be provided, as follows:
94class APAPA {  private int attr1;  protected int attr2;  public int getAttn1() {    return attr1;  }  public int getAttr2() {    return attr2;  }  public void setAttr2(int newVal) {    attr2 = newVal;  }}


[0290] Avoid Statements With Empty Body


[0291] Statements having empty bodies should be avoided. For example, in the following source code:
95StringTokenizer st = new StringTokenizer(class1.getName(), “.”, true);String s;for( s = “”; st.countTokens() > 2;  s = s + st.nextToken());


[0292] a statement body should be provided. In the alternative, the logic of the program may be changed. For example, the “for” statement can be replaced by a “while” statement, as follows:
96StringTokenizer st = new StringTokenizer(class1.getName(), “.”, true);String s = “”;while( st.countTokens() > 2) {  s += st.nextToken();}


[0293] Assignment To For-Loop Variables


[0294] For-loop variables should not be assigned a value. For example, the for-loop variable “i” should not be assigned the value i++ as follows:
97for (int i = 0; i < charBuf.length; i++) {  while ( Character.isWhitespace(charBuf[i]))    i++;  ....}


[0295] A continue operator should be used to correct the above code, as follows:
98for (int i = 0; i < charBuf.length; i++) {  while ( Character.isWhitespace(charBuf[i]))    continue;  ....}


[0296] In the alternative, the for-loop may be converted to a while-loop.


[0297] Don't Compare Floating Point Types


[0298] Avoid testing floating point numbers for equality. Floating-point numbers that should be equal are not exactly equal due to rounding problems. Thus, the direct comparison in the following code:
99void oper (double d) {  if( d!= 15.0 ) {    for ( double f = 0.0; f < d; f += 1.0) {      // do something    }  }}


[0299] should be replaced with an estimation of the absolute value of the difference, as follows:
100void oper (double d) {  if( Math.abs(d − 15.0) < Double.MIN_VALUE * 2 ) {    for (double f = 0.0; d − f > DIFF; f += 1.0) {      // do something    }  }}


[0300] Enclosing Body Within a Block


[0301] The statement of a loop must always be a block. The then and else parts of if—statements must always be blocks. This makes it easier to add statements without accidentally introducing bugs due to missing braces. Thus, the following code is missing braces for both the if-loop and the while-loop:
101if( st == null)  return;while( st.countTokens() > 2)  s += st.nextToken();


[0302] The correct form for the above code is as follows:
102if(st == null) {  return;}while( st.countTokens() > 2) {  s += st.nextToken();}


[0303] Explicitly Initialize All Variables


[0304] All variables should explicitly be initialized. The only reason not to initialize a declared variable is if the initial value depends on a previous computation. For example, the following source code violates this rule since var0 and var2 are not initialized:
103void func () {  int var0;  int var1 = 1, var2;  // do something.. }


[0305] The correct form for the above source code is as follows:
104void func () {  int var0 = 0;  int var1 = 1, var2 = 0;  // do something..}


[0306] Method finalize() Doesn't Call super.finalize()


[0307] It is a good practice of programming to call super.finalize() from finalize(), even if the base class doesn't define the finalize() method. This makes class implementations less dependent on each other. Thus, the following source code:
105void finalize () {}


[0308] should be modified to:
106void finalize () {  super.finalize();}


[0309] Mixing Logical Operators Without Parentheses


[0310] An expression containing multiple logical operators together should be parenthesized properly. Thus, in the following source code:
107void oper () {  boolean a, b, c;  // do something  if( a || (b && c) {    // do something    return;  }}


[0311] the parenthesis should be used to clarify complex logical expression to the reader, as follows:
108void oper () {  boolean a, b, c;  // do something  if( a || (b && c)) {    // do something    return;  }}


[0312] No Assignments In Conditional Expressions


[0313] Assignments within conditions should be avoided since they make the source code difficult to understand. For example, the following source code:
109if ( (dir = new File(targetDir)).exists() ) {  // do something}


[0314] should be replaced by:
110dir = new File(targetDir);if( dir.exists() ) {  // do something}


[0315] Supply Break or Comment in Case Statement


[0316] Every time a case falls through and doesn't include a break statement, a comment should be added where the break statement would normally be. The break in the default case is redundant, but it prevents a fall-through error if later another case is added. Thus in the following source code:
111switch( c ) {  case ‘n’:    result += ‘\n’;    break;  case ‘r’:    result += ‘\r’;    break;  case ′\″:    someFlag = true;  case ′\′″:    result += c;    break;  // some more code...}


[0317] a /* falls through */ comment should be added, as follows:
112switch( c ) {  case ‘n’:    result += ‘\n’;    break;  case ‘r’:    result += ‘\r’;    break;  case ′\″:    someFlag = true;    /* falls through */;  case ′\′″:    result += c;    break;  // some more code...}


[0318] Use ‘equals’ Instead Of ‘=’


[0319] The ‘=’ operator is used on strings to check if two string objects are identical. However, in most cases, one would like to check if two strings have the same value. In these cases, the ‘equals’ method should be used. Thus, the following source code:
113void func (String str1, String str2) {  if(str1 == str2) {    // do something  }}


[0320] should be replaced by:
114void func (String str1, String str2) {  if( str1.equals(str2)) {    // do something  }}


[0321] Use ‘L’ Instead Of “l” at the end of integer constant


[0322] It is difficult to distinguish between lower case letter ‘l’ and digit ‘1’. As far as the letter ‘l’ can be used as a long modifier at the end of integer constant, it can be mixed with the digit. Thus, it is better to use an uppercase ‘L’. In the following example:
115void func () {  long var = 0x0001111l;}


[0323] the trailing ‘l’ letter at the end of integer constants should be replaced with ‘L,’ as follows:
116void func () {  long var = 0x0001111L;}


[0324] Use Of the ‘synchronized’ Modifier


[0325] The ‘synchronized’ modifier on methods can sometimes cause confusion during maintenance and debugging. This rule recommends avoiding the use of this modifier and encourages using ‘synchronized’ statements instead. Thus, in the following source code:
117class UOSM {  public synchronized void method () {    // do something  }}


[0326] synchronized statements should be used instead of synchronized methods, as follows:
118class UOSM {  public void method () {    synchronized(this) {      // do something    }  }}


[0327] Superfluous Content


[0328] Duplicate Import Declarations


[0329] There should be only one import declaration that imports a particular class/package. The following source code violates this audit by containing multiple import declarations for java.io.* and java.sql.time:
119package audit;import java.io.*;import java.io.*;import java.sql.Time;import java.sql.Time;class DID {}


[0330] To correct the above code, duplicate declarations should be deleted.


[0331] Don't Import the Package the Source File Belongs To


[0332] No classes or interfaces need to be imported from the package that the source code file belongs to. Everything in that package is available without explicit import statements. Thus, the following source code contains the unnecessary import of “audit”:
120package audit;import java.awt.*;import audit.*;public class DIPSFBT {}


[0333] To correct the above code, the unnecessary import statement should be deleted.


[0334] Explicit Import Of the java.lang Classes


[0335] Explicit import of classes from the package ‘java.lang’ should not be performed. Thus, in the following source code, the unnecessary import of “java.lang.*” should be deleted:
121package audit;import java.lang.*;class EIOJLC {}


[0336] Equality Operations On Boolean Arguments


[0337] Avoid performing equality operations on boolean operands. True and false literals should not be used in conditional clauses, as shown below:
122int oper (boolean bOk) {  if(bOk) {    return 1;  }  while ( bOk == true ) {    // do something  }  return ( bOk == false )? 1 : 0;}


[0338] The above source code should be replaced with the following:
123int oper (boolean bOk) {  if(bOk) {    return 1;  }  while ( bOk) {    // do something  }  return( !bOk) ? 1 : 0;}


[0339] Imported Items Must Be Used


[0340] It is not legal to import a class or an interface and never use it. This audit checks classes and interfaces that are explicitly imported with their names, not those with import of a complete package, i.e., using an asterisk. If unused class and interface imports are omitted, the amount of meaningless source code is reduced, thus the amount of code to be understood by a reader is minimized. Thus, the unnecessary import of “stack” in the following source code should be deleted:
124import java.awt.*;import java.util.Dictionary;import java.util.Hashtable;import java.util.Stack;import java.util.Vector;class IIMBU {  Dictionary dict;  void func (Vector vec) {    Hashtable ht;    // do something  }}


[0341] Unnecessary Casts


[0342] This audit checks for the use of type casts that are not necessary. A cast is a Java™ language construct that performs a narrowing conversion. Thus, in the following example the cast “(elephant) el” is not necessary since el is already defined as type elephant:
125class Animal {}class Elephant extends Animal {  void func () {    int i;    float f = (float) i;    Elephant e1;    Elephant e2 = (Elephant) e1;    Animal a;    Elephant e;    a = (Animal) e;  }}


[0343] In the above example, the unnecessary cast should be deleted to improve readability.


[0344] Unnecessary ‘instanceof’ Evaluations


[0345] This audit determines whether the runtime type of the left-hand side expression is the same as the one specified on the right-hand side. Thus, in the following source code, the “if-loops” are unnecessary since both statements within the if loop are defined to be true. In particular, “Animal animal” defines animal as type Animal, “Elephant elephant” defines elephant as type Elephant, and “class Elephant extends Animal {}” defines Elephant to be the same type as Animal. Thus, elephant is also defined as type “Animal.”
126class UIOE {  void operation () {    Animal animal;    Elephant elephant;    if( animal instanceof Animal) {      doSomething1(animal);    }    if( elephant instanceof Animal) {      doSomething2(elephant);    }  }}class Animal {}class Elephant extends Animal {}


[0346] To correct the above code, the if-loops can be removed, as follows:
127class UIOE {  void operation () {    Animal animal;    Elephant elephant;    doSomething1(animal);    doSomething2(elephant);  }}class Animal {}class Elephant extends Animal {}


[0347] Unused Local Variables And Formal Parameters


[0348] Local variables and formal parameters declarations must be used. Thus, in the following source code, the unused local variables and formal parameters should not be used.
128int oper (int unused_param, int used_param) {  int unused_var;  return 2 * used_param;}


[0349] Use Of Obsolete Interface Modifier


[0350] The modifier ‘abstract,’ as shown in the following code, is considered obsolete and should not be used:


[0351] abstract interface UOOIM {}


[0352] The above source code should be replaced by the following:


[0353] interface UOOIM {}


[0354] Use Of Unnecessary Interface Member Modifiers


[0355] All interface operations are implicitly public and abstract. All interface attributes are implicitly public, final and static. Thus, the following source code contains unnecessary interface member modifiers:
129interface UOUIMM {  int attr1;  public final static int ATTR2;  void oper1 ();  public abstract void oper2 ();}


[0356] The above code may be corrected, as follows:
130interface UOUIMM {  int attr1;  final static int ATTR2;  void oper1 ();  void oper2 ();}


[0357] Unused Private Class Member


[0358] An unused class member might indicate a logical flaw in the program. The class declaration has to be reconsidered in order to determine the need of the unused member(s). Thus, in the following source code, the unnecessary members, i.e., “bad_attr” and “bad_oper(),” should be removed.
131class UPCM {private int bad_attr;private int good_attr;private void bad_oper () {// do something . . . ;}private void good_oper1 () {good_attr = 10;}public void good_oper2() {good_oper1();}}


[0359] Unnecessary Return statement Parentheses


[0360] A return statement with a value should not use parentheses unless it makes the return value more obvious in some way. For example, the following source code violates this audit:
132return;return (myDisk.size());return (sizeOk ? size: defaultSize);


[0361] and should be replaced by:
133return;return myDisk.size();return (sizeOk ? size : defaultSize);


[0362] Locating Source Code Referenced By Verification Tool


[0363] The QA module is a verification tool. Conventional compilers are also verification tools, which provide messages to the user if an error is detected within the source code. The software development tool in accordance with methods and systems consistent with the present invention uses the error message from the verification tool to locate the source code corresponding to the message. Thus, the developer can use the improved software development tool to determine which line of source code corresponds to an error message from a verification tool. The verification tool may be part of the software development tool, or it may be external to the software development tool.


[0364]
FIGS. 20A and B depict a flow diagram illustrating how the software development tool allows a developer to quickly locate source code referenced by a verification tool. The first step performed by the software development tool is to display the textual representation of the source code in a project (step 2000 in FIG. 20A). The software development tool simultaneously displays the graphical representation of the source code in the project (step 2002). For example, FIG. 21 depicts screen 2100 with both a textual representation 2102 and a graphical representation 2104 of a project 2106. The screen 2100 also displays the error messages 2108 received from the audit option of the QA module. The error messages 2108 include the severity 2110 of the message, the abbreviation 2112 used to identify the message, an explanation 2114 of the message, the element 2116 in which the error occurs, the item 2118 to which the error refers, the file 2120 in which the error occurs, and the line number 2122 of the source code where the error occurs.


[0365] The choices for the severity 2110 are low, normal, and high. An example of an audit error message having low severity is “Avoid Too Long Files” (“ATLF”), which occurs when a file contains more than 2000 lines. According to standard code conventions for the Java™ programming language, having more than 2000 lines are cumbersome and should be avoided. Because this audit identifies a suggested format that will not affect the compilation or execution of the source code, it is considered a low severity message. The explanation 2114 of this message is “Avoid Too Long Files,” and the message uses the abbreviation 2112 “ATLF.” This message relates to a file that contains more than 2000 lines. Thus, the item 2118 to which the message occurs identifies the file name. The file 2120 in which the error occurs also identifies the same file, but includes the path to the file with the file name. With the ATLF audit, the line number 2122 of the source code where the error occurs is 2001 because the audit feature will not identify this error until it reaches the 2001st line of the source code. An example of a “normal” severity message is “Use Abbreviated Assignment Operator” (“UAAO”). The abbreviated assignment operator is preferred in order to write programs more rapidly and because some compilers run faster using abbreviated assignment operators. Although the failure to use the abbreviated assignment operator may slow the compilation of the source code, it will not prevent the program from compiling or executing properly, and is thus not a high severity message. Because of its effect on the compilation time, however, the failure to use the abbreviated assignment operator is considered a normal severity message rather than a low severity message. Finally, a high priority message is one that will prevent the source code from executing properly. For example, “Avoid Hiding Inherited Static Methods” (“AHISM”) identifies when inherited static operations are hidden by child classes. Thus, if the same term is used to define a class field in both a parent and a child class, the software development tool will use the same definition in both cases because the term is defined more than once within the project, thus making it ambiguous.


[0366] Returning to the flow diagram in FIG. 20A, when a developer chooses one of the messages 2108, the software development tool receives the message 2108 from the verification tool (step 2004). As discussed above, the message 2108 includes the file 2120 in which the error occurs and the line number 2122 of the source code where the error occurs. Thus, in the example shown, the software development tool obtains this information and uses it to locate the source code corresponding to the message 2108 (step 2006). If the text of the source code corresponding to the message 2108 is not displayed (step 2008), the software development tool displays the source code corresponding to the message (step 2010). The software development tool then displays the source code corresponding to the message in a visually distinctive manner, e.g., the software development tool may highlight, italicize, or bold the source code, or it may display the code in a different color or with a different color background (step 2012 in FIG. 20B). Thus, if a developer chooses the “Avoids Too Long Lines” message 2202 shown on the screen 2200 in FIG. 22, the software development tool finds line number 2204 located in the file 2206 at C:/Together4.2/samples/java/Hello/Hello . . . , determines that the line is not currently displayed, and displays it in a visually distinctive manner, as shown on the screen 2300 in FIG. 23. The software development tool then determines whether the graphical representation 2306 of the source code corresponding to the message is displayed (step 2014). If the graphical representation is not displayed, the software development tool displays the graphical representation 2306 of the source code corresponding to the message (step 2016). The software development tool then displays the graphical representation 2306 of the source code in a visually distinctive manner, e.g., the software development tool may highlight the graphical representation 2306, change its color, or change the color of its background (step 2018). Thus, in the example shown, the software development tool determines that the graphical representation 2306 of the message is shown, and modifies its representation in a visually distinctive manner.


[0367] Although discussed in terms of the audit function of the QA module, the software development tool of the present invention may also use other verification tools to receive messages and locate specific lines of source code referenced by the message. These verification tools may be integrated into the software development tool, as in the case of the QA module, or may be external to the software development tool. Any verification tool known in the art may be used, and any known technique to locate the line of source code may be used.


[0368] While various embodiments of the present invention have been described, it will be apparent to those of skill in the art that many more embodiments and implementations are possible that are within the scope of this invention. Accordingly, the present invention is not to be restricted except in light of the attached claims and their equivalents.


Claims
  • 1. A method in a data processing system for developing source code comprising the steps of: displaying a graphical representation of the source code; receiving a message corresponding to a portion of the source code; locating the portion of the source code corresponding to the message; displaying the portion of the source code corresponding to the message in a visually distinctive manner; determining whether the graphical representation of the portion of the source code corresponding to the message is displayed; and when it is determined that the graphical representation of the portion of the source code corresponding to the message is not displayed, displaying the graphical representation of the portion of the source code corresponding to the message; and modifying the graphical representation of the portion of the source code corresponding to the message in a visually distinctive manner.
  • 2. The method of claim 1, wherein the message is received from a verification tool.
  • 3. The method of claim 2, wherein the verification tool comprises a compiler.
  • 4. The method of claim 2, wherein the verification tool comprises a quality assurance module.
  • 5. The method of claim 1, wherein the message comprises an error message.
  • 6. The method of claim 1, wherein the message comprises a line number of the source code.
  • 7. The method of claim 6, wherein the portion of the source code corresponding to the message is located using the line number.
  • 8. The method of claim 1, wherein the message comprises a name of a file containing the source code.
  • 9. The method of claim 1, wherein the graphical representation comprises a class diagram.
  • 10. A method in a data processing system for developing source code comprising the steps of: displaying a graphical representation of the source code; receiving a message corresponding to a portion of the source code; locating the portion of the source code corresponding to the message; displaying the portion of the source code corresponding to the message; and displaying the graphical representation of the portion of the source code corresponding to the message in a visually distinctive manner.
  • 11. The method of claim 10, further comprising the steps of: detecting an error in the source code; and generating a message reflecting the error.
  • 12. The method of claim 10, wherein the message is received from a verification tool.
  • 13. The method of claim 12, wherein the verification tool comprises a compiler.
  • 14. The method of claim 12, wherein the verification tool comprises a quality assurance module.
  • 15. The method of claim 10, wherein the message comprises an error message.
  • 16. The method of claim 10, wherein the message comprises a line number of the source code.
  • 17. The method of claim 16, wherein the portion of the source code corresponding to the message is located using the line number.
  • 18. The method of claim 10, wherein the message comprises a name of a file containing the source code.
  • 19. The method of claim 10, wherein the graphical representation comprises a class diagram.
  • 20. A method in a data processing system for developing source code comprising the steps of: receiving a message corresponding to a portion of the source code; and displaying the graphical representation of the portion of the source code corresponding to the message in a visually distinctive manner.
  • 21. The method of claim 20, wherein the message is received from a verification tool.
  • 22. The method of claim 21, wherein the verification tool comprises a compiler.
  • 23. The method of claim 21, wherein the verification tool comprises a quality assurance module.
  • 24. The method of claim 20, wherein the message comprises an error message.
  • 25. The method of claim 20, wherein the message comprises a line number of the source code.
  • 26. The method of claim 25, wherein the portion of the source code corresponding to the message is located using the line number.
  • 27. The method of claim 20, wherein the message comprises a name of a file containing the source code.
  • 28. The method of claim 20, wherein the graphical representation comprises a class diagram.
  • 29. The method of claim 20, wherein the message comprises a basic metrics message.
  • 30. The method of claim 29, wherein the basic metrics message comprises a lines of code message.
  • 31. The method of claim 29, wherein the basic metrics message comprises a number of attributes message.
  • 32. The method of claim 29, wherein the basic metrics message comprises a number of classes message.
  • 33. The method of claim 29, wherein the basic metrics message comprises a number of constructors message.
  • 34. The method of claim 29, wherein the basic metrics message comprises a number of import statements message.
  • 35. The method of claim 29, wherein the basic metrics message comprises a number of members message.
  • 36. The method of claim 29, wherein the basic metrics message comprises a number of operations message.
  • 37. The method of claim 20, wherein the message comprises a cohesion metrics message.
  • 38. The method of claim 37, wherein the cohesion metrics message comprises a lack of cohesion message.
  • 39. The method of claim 20, wherein the message comprises a complexity metrics message.
  • 40. The method of claim 39, wherein the complexity metrics message comprises an attribute complexity message.
  • 41. The method of claim 39, wherein the complexity metrics message comprises a cyclomatic complexity message.
  • 42. The method of claim 39, wherein the complexity metrics message comprises a number of remote methods message.
  • 43. The method of claim 39, wherein the complexity metrics message comprises a response for class message.
  • 44. The method of claim 39, wherein the complexity metrics message comprises a weighted methods per class message.
  • 45. The method of claim 20, wherein the message comprises a coupling metrics message.
  • 46. The method of claim 45, wherein the coupling metrics message comprises a coupling between objects message.
  • 47. The method of claim 45 wherein the coupling metrics message comprises a coupling factor message.
  • 48. The method of claim 45, wherein the coupling metrics message comprises a data abstraction coupling message.
  • 49. The method of claim 45, wherein the coupling metrics message comprises a fanout message.
  • 50. The method of claim 20, wherein the message comprises a Halstead metrics message.
  • 51. The method of claim 50, wherein the Halstead metrics message comprises a Halstead difficulty message.
  • 52. The method of claim 50, wherein the Halstead metrics message comprises a Halstead effort message.
  • 53. The method of claim 50, wherein the Halstead metrics message comprises a Halstead program length message.
  • 54. The method of claim 50, wherein the Halstead metrics message comprises a Halstead program vocabulary message.
  • 55. The method of claim 50, wherein the Halstead metrics message comprises a Halstead program volume message.
  • 56. The method of claim 50, wherein the Halstead metrics message comprises a number of operands message.
  • 57. The method of claim 50, wherein the Halstead metrics message comprises a number of operators message.
  • 58. The method of claim 50, wherein the Halstead metrics message comprises a number of unique operands message.
  • 59. The method of claim 50, wherein the Halstead metrics message comprises a number of unique operators message.
  • 60. The method of claim 20, wherein the message comprises an incapsulation metrics message.
  • 61. The method of claim 60, wherein the incapsulation metrics message comprises an attribute hiding factor message.
  • 62. The method of claim 60, wherein the incapsulation metrics message comprises a method hiding factor message.
  • 63. The method of claim 20, wherein the message comprises an inheritance metrics message.
  • 64. The method of claim 63, wherein the inheritance metrics message comprises an attribute inheritance factor message.
  • 65. The method of claim 63, wherein the inheritance metrics message comprises a depth of inheritance hierarchy message.
  • 66. The method of claim 63, wherein the inheritance metrics message comprises a method inheritance factor message.
  • 67. The method of claim 63, wherein the inheritance metrics message comprises a number of child classes message.
  • 68. The method of claim 20, wherein the message comprises a maximum metrics message.
  • 69. The method of claim 68, wherein the maximum metrics message comprises a maximum number of levels message.
  • 70. The method of claim 68, wherein the maximum metrics message comprises a maximum number of parameters message.
  • 71. The method of claim 68, wherein the maximum metrics message comprises a maximum size of operation message.
  • 72. The method of claim 20, wherein the message comprises a polymorphism metrics message.
  • 73. The method of claim 72, wherein the polymorphism metrics message comprises a number of added methods message.
  • 74. The method of claim 72, wherein the polymorphism metrics message comprises a number of overridden methods message.
  • 75. The method of claim 72, wherein the polymorphism metrics message comprises a polymorphism factor message.
  • 76. The method of claim 20, wherein the message comprises a ratio metrics message.
  • 77. The method of claim 76, wherein the ratio metrics message comprises a comment ratio message.
  • 78. The method of claim 76, wherein the ratio metrics message comprises a percentage of package members message.
  • 79. The method of claim 76, wherein the ratio metrics message comprises a percentage of private members message.
  • 80. The method of claim 76, wherein the ratio metrics message comprises a percentage of protected members message.
  • 81. The method of claim 76, wherein the ratio metrics message comprises a percentage of public members message.
  • 82. The method of claim 76, wherein the ratio metrics message comprises a true comment ratio message.
  • 83. The method of claim 20, wherein the message comprises a coding style audits message.
  • 84. The method of claim 83, wherein the coding style audits message comprises an avoid complex initialization or update clause in for loops message.
  • 85. The method of claim 83, wherein the coding style audits message comprises an avoid implementation packages referencing message.
  • 86. The method of claim 83, wherein the coding style audits message comprises an access of static members through objects message.
  • 87. The method of claim 83, wherein the coding style audits message comprises an assignment to formal parameters message.
  • 88. The method of claim 83, wherein the coding style audits message comprises an avoid too long files message.
  • 89. The method of claim 83, wherein the coding style audits message comprises an avoid too long lines message.
  • 90. The method of claim 83, wherein the coding style audits message comprises a complex assignment message.
  • 91. The method of claim 83, wherein the coding style audits message comprises a don't code numerical constants directly message.
  • 92. The method of claim 83, wherein the coding style audits message comprises a don't place multiple statements on the same line message.
  • 93. The method of claim 83, wherein the coding style audits message comprises a don't use the negation operator frequently message.
  • 94. The method of claim 83, wherein the coding style audits message comprises an operator ‘?:’ may not be used message.
  • 95. The method of claim 83, wherein the coding style audits message comprises a parenthesize conditional part of ternary conditional expression message.
  • 96. The method of claim 83, wherein the coding style audits message comprises a put declarations only at the beginning of blocks message.
  • 97. The method of claim 83, wherein the coding style audits message comprises a provide incremental in for-statement or use while-statement message.
  • 98. The method of claim 83, wherein the coding style audits message comprises a replacement for demand imports message.
  • 99. The method of claim 83, wherein the coding style audits message comprises a switch statement should include a default case message.
  • 100. The method of claim 83, wherein the coding style audits message comprises a use abbreviated assignment operator message.
  • 101. The method of claim 83, wherein the coding style audits message comprises a use ‘this’ explicitly to access class members message.
  • 102. The method of claim 20, wherein the message comprises a critical errors audits message.
  • 103. The method of claim 102, wherein the critical errors audits message comprises an avoid hiding inherited attributes message.
  • 104. The method of claim 102, wherein the critical errors audits message comprises an avoid hiding inherited static methods message.
  • 105. The method of claim 102, wherein the critical errors audits message comprises a command query separation message.
  • 106. The method of claim 102, wherein the critical errors audits message comprises a hiding of names message.
  • 107. The method of claim 102, wherein the critical errors audits message comprises an inaccessible constructor or method matches message.
  • 108. The method of claim 102, wherein the critical errors audits message comprises a multiple visible declarations with same name message.
  • 109. The method of claim 102, wherein the critical errors audits message comprises an overriding a non-abstract method with an abstract method message.
  • 110. The method of claim 102, wherein the critical errors audits message comprises an overriding a private method message.
  • 111. The method of claim 102, wherein the critical errors audits message comprises an overloading within a subclass message.
  • 112. The method of claim 102, wherein the critical errors audits message comprises a use of static attribute for initialization message.
  • 113. The method of claim 20, wherein the message comprises a declaration style audits message.
  • 114. The method of claim 113, wherein the declaration style audits message comprises a badly located array declarators message.
  • 115. The method of claim 113, wherein the declaration style audits message comprises a constant private attributes must be final message.
  • 116. The method of claim 113, wherein the declaration style audits message comprises a constant variables must be final message.
  • 117. The method of claim 113, wherein the declaration style audits message comprises a declare variables in one statement each message.
  • 118. The method of claim 113, wherein the declaration style audits message comprises an instantiated classes should be final message.
  • 119. The method of claim 113, wherein the declaration style audits message comprises a list all public and package members first message.
  • 120. The method of claim 113, wherein the declaration style audits message comprises an order of class members declaration message.
  • 121. The method of claim 113, wherein the declaration style audits message comprises an order of appearance of modifiers message.
  • 122. The method of claim 113, wherein the declaration style audits message comprises a put the main function last message.
  • 123. The method of claim 113, wherein the declaration style audits message comprises a place public class first message.
  • 124. The method of claim 20, wherein the message comprises a documentation audits message.
  • 125. The method of claim 124, wherein the documentation audits message comprises a bad tag in JavaDoc comments message.
  • 126. The method of claim 124, wherein the documentation audits message comprises a distinguish between JavaDoc and ordinary comments message.
  • 127. The method of claim 124, wherein the documentation audits message comprises a provide file comments message.
  • 128. The method of claim 124, wherein the documentation audits message comprises a provide JavaDoc comments message.
  • 129. The method of claim 20, wherein the message comprises a naming style audits message.
  • 130. The method of claim 129, wherein the naming style audits message comprises a class name must match its file name message.
  • 131. The method of claim 129, wherein the naming style audits message comprises a group operations with same name together message.
  • 132. The method of claim 129, wherein the naming style audits message comprises a naming conventions message.
  • 133. The method of claim 129, wherein the naming style audits message comprises a names of exception classes message.
  • 134. The method of claim 129, wherein the naming style audits message comprises a use conventional variable names message.
  • 135. The method of claim 20, wherein the message comprises a performance audits message.
  • 136. The method of claim 135, wherein the performance audits message comprises an avoid declaring variables inside loops message.
  • 137. The method of claim 135, wherein the performance audits message comprises an append to string within a loop message.
  • 138. The method of claim 135, wherein the performance audits message comprises a complex loop expressions message.
  • 139. The method of claim 20, wherein the message comprises a possible error audits message.
  • 140. The method of claim 139, wherein the possible error audits message comprises an avoid empty catch blocks message.
  • 141. The method of claim 139, wherein the possible error audits message comprises an avoid public and package attributes message.
  • 142. The method of claim 139, wherein the possible error audits message comprises an avoid statements with empty body message.
  • 143. The method of claim 139, wherein the possible error audits message comprises an assignment to for-loop variables message.
  • 144. The method of claim 139, wherein the possible error audits message comprises a don't compare floating point types message.
  • 145. The method of claim 139, wherein the possible error audits message comprises an enclosing body within a block message.
  • 146. The method of claim 139, wherein the possible error audits message comprises an explicitly initialize all variables message.
  • 147. The method of claim 139, wherein the possible error audits message comprises a method finalize() doesn't call super.finalize() message.
  • 148. The method of claim 139, wherein the possible error audits message comprises a mixing logical operators without parentheses message.
  • 149. The method of claim 139, wherein the possible error audits message comprises a no assignments in conditional expressions message.
  • 150. The method of claim 139, wherein the possible error audits message comprises a supply break or comment in case statement message.
  • 151. The method of claim 139, wherein the possible error audits message comprises a use ‘equals’ instead of ‘=’ message.
  • 152. The method of claim 139, wherein the possible error audits message comprises a use ‘L’ instead of ‘l’ at the end of integer constant message.
  • 153. The method of claim 139, wherein the possible error audits message comprises a use of the ‘synchronized’ modifier message.
  • 154. The method of claim 20, wherein the message comprises a superfluous content audits message.
  • 155. The method of claim 154, wherein the superfluous content audits message comprises a duplicate import declarations message.
  • 156. The method of claim 154, wherein the superfluous content audits message comprises a don't import the package the source file belongs to message.
  • 157. The method of claim 154, wherein the superfluous content audits message comprises an explicit import of the java.lang classes message.
  • 158. The method of claim 154, wherein the superfluous content audits message comprises an equality operations on boolean arguments message.
  • 159. The method of claim 154, wherein the superfluous content audits message comprises an imported items must be used message.
  • 160. The method of claim 154, wherein the superfluous content audits message comprises an unnecessary casts message.
  • 161. The method of claim 154, wherein the superfluous content audits message comprises an unnecessary ‘instanceof’ evaluations message.
  • 162. The method of claim 154, wherein the superfluous content audits message comprises an unused local variables and formal parameters message.
  • 163. The method of claim 154, wherein the superfluous content audits message comprises a use of obsolete interface modifier message.
  • 164. The method of claim 154, wherein the superfluous content audits message comprises a use of unnecessary interface member modifiers message.
  • 165. The method of claim 154, wherein the superfluous content audits message comprises an unused private class member message.
  • 166. The method of claim 154, wherein the superfluous content audits message comprises an unnecessary return statement parentheses message.
  • 167. A method in a data processing system for developing source code comprising the steps of: displaying a graphical representation of the source code; detecting an error in the source code; generating a message reflecting the error; locating a portion of the source code corresponding to the message; displaying the portion of the source code corresponding to the message in a visually distinctive manner; determining whether the graphical representation of the portion of the source code corresponding to the message is displayed; and when it is determined that the graphical representation of the portion of the source code corresponding to the message is not displayed, displaying the graphical representation of the portion of the source code corresponding to the message; and modifying the graphical representation of the portion of the source code corresponding to the message in a visually distinctive manner.
  • 168. The method of claim 167, wherein the message is generated by a verification tool.
  • 169. The method of claim 168, wherein the verification tool comprises a compiler.
  • 170. The method of claim 168, wherein the verification tool comprises a quality assurance module.
  • 171. The method of claim 167, wherein the message comprises an error message.
  • 172. The method of claim 167, wherein the message comprises a line number of the source code.
  • 173. The method of claim 172, wherein the portion of the source code corresponding to the message is located using the line number.
  • 174. The method of claim 167, wherein the message comprises a name of a file containing the source code.
  • 175. The method of claim 167, wherein the graphical representation comprises a class diagram.
  • 176. A method in a data processing system for developing source code comprising the steps of: displaying a graphical representation of the source code; detecting an error in the source code; generating a message reflecting the error; locating a portion of the source code corresponding to the message; displaying the portion of the source code corresponding to the message; and displaying the graphical representation of the portion of the source code corresponding to the message in a visually distinctive manner.
  • 177. The method of claim 176, wherein the message is generated by a verification tool.
  • 178. The method of claim 177, wherein the verification tool comprises a compiler.
  • 179. The method of claim 177, wherein the verification tool comprises a quality assurance module.
  • 180. The method of claim 176, wherein the message comprises an error message.
  • 181. The method of claim 176, wherein the message comprises a line number of the source code.
  • 182. The method of claim 181, wherein the portion of the source code corresponding to the message is located using the line number.
  • 183. The method of claim 176, wherein the message comprises a name of a file containing the source code.
  • 184. The method of claim 176, wherein the graphical representation comprises a class diagram.
  • 185. A method in a data processing system for developing source code comprising the steps of: detecting an error in the source code; generating a message reflecting the error; and displaying the graphical representation of a portion of the source code corresponding to the message in a visually distinctive manner.
  • 186. The method of claim 185, wherein the message is generated by a verification tool.
  • 187. The method of claim 186, wherein the verification tool comprises a compiler.
  • 188. The method of claim 186, wherein the verification tool comprises a quality assurance module.
  • 189. The method of claim 185, wherein the message comprises an error message.
  • 190. The method of claim 185, wherein the message comprises a line number of the source code.
  • 191. The method of claim 190, wherein the portion of the source code corresponding to the message is located using the line number.
  • 192. The method of claim 185, wherein the message comprises a name of a file containing the source code.
  • 193. The method of claim 185, wherein the graphical representation comprises a class diagram.
  • 194. A computer-readable medium containing instructions for controlling a data processing system to perform a method, the data processing system having source code, the method comprising the steps of: displaying a graphical representation of the source code; receiving a message corresponding to a portion of the source code; locating the portion of the source code corresponding to the message; displaying the portion of the source code corresponding to the message in a visually distinctive manner; determining whether the graphical representation of the portion of the source code corresponding to the message is displayed; and when it is determined that the graphical representation of the portion of the source code corresponding to the message is not displayed, displaying the graphical representation of the portion of the source code corresponding to the message; and modifying the graphical representation of the portion of the source code corresponding to the message in a visually distinctive manner.
  • 195. The computer-readable medium of claim 194, wherein the message is received from a verification tool.
  • 196. The computer-readable medium of claim 195, wherein the verification tool comprises a compiler.
  • 197. The computer-readable medium of claim 195, wherein the verification tool comprises a quality assurance module.
  • 198. The computer-readable medium of claim 194, wherein the message comprises an error message.
  • 199. The computer-readable medium of claim 194, wherein the message comprises a line number of the source code.
  • 200. The computer-readable medium of claim 199, wherein the portion of the source code corresponding to the message is located using the line number.
  • 201. The computer-readable medium of claim 194, wherein the message comprises a name of a file containing the source code.
  • 202. The computer-readable medium of claim 194, wherein the graphical representation comprises a class diagram.
  • 203. A computer-readable medium containing instructions for controlling a data processing system to perform a method, the data processing system having source code, the method comprising the steps of: displaying a graphical representation of the source code; receiving a message corresponding to a portion of the source code; locating the portion of the source code corresponding to the message; displaying the portion of the source code corresponding to the message; and displaying the graphical representation of the portion of the source code corresponding to the message in a visually distinctive manner.
  • 204. The computer-readable medium of claim 203, wherein the method further comprises the steps of: detecting an error in the source code; and generating a message reflecting the error.
  • 205. The computer-readable medium of claim 203, wherein the message is received from a verification tool.
  • 206. The computer-readable medium of claim 205, wherein the verification tool comprises a compiler.
  • 207. The computer-readable medium of claim 205, wherein the verification tool comprises a quality assurance module.
  • 208. The computer-readable medium of claim 203, wherein the message comprises an error message.
  • 209. The computer-readable medium of claim 203, wherein the message comprises a line number of the source code.
  • 210. The computer-readable medium of claim 209, wherein the portion of the source code corresponding to the message is located using the line number.
  • 211. The computer-readable medium of claim 203, wherein the message comprises a name of a file containing the source code.
  • 212. The computer-readable medium of claim 203, wherein the graphical representation comprises a class diagram.
  • 213. A computer-readable medium containing instructions for controlling a data processing system to perform a method, the data processing system having source code, the method comprising the steps of: receiving a message corresponding to a portion of the source code; and displaying the graphical representation of the portion of the source code corresponding to the message in a visually distinctive manner.
  • 214. The computer-readable medium of claim 213, wherein the message is received from a verification tool.
  • 215. The computer-readable medium of claim 214, wherein the verification tool comprises a compiler.
  • 216. The computer-readable medium of claim 214, wherein the verification tool comprises a quality assurance module.
  • 217. The computer-readable medium of claim 213, wherein the message comprises an error message.
  • 218. The computer-readable medium of claim 213, wherein the message comprises a line number of the source code.
  • 219. The computer-readable medium of claim 218, wherein the portion of the source code corresponding to the message is located using the line number.
  • 220. The computer-readable medium of claim 213, wherein the message comprises a name of a file containing the source code.
  • 221. The computer-readable medium of claim 213, wherein the graphical representation comprises a class diagram.
  • 222. A computer-readable medium containing instructions for controlling a data processing system to perform a method, the data processing system having source code, the method comprising the steps of: displaying a graphical representation of the source code; detecting an error in the source code; generating a message reflecting the error; locating a portion of the source code corresponding to the message; displaying the portion of the source code corresponding to the message in a visually distinctive manner; determining whether the graphical representation of the portion of the source code corresponding to the message is displayed; and when it is determined that the graphical representation of the portion of the source code corresponding to the message is not displayed, displaying the graphical representation of the portion of the source code corresponding to the message; and modifying the graphical representation of the portion of the source code corresponding to the message in a visually distinctive manner.
  • 223. The computer-readable medium of claim 222, wherein the message is generated by a verification tool.
  • 224. The computer-readable medium of claim 223, wherein the verification tool comprises a compiler.
  • 225. The computer-readable medium of claim 223, wherein the verification tool comprises a quality assurance module.
  • 226. The computer-readable medium of claim 222, wherein the message comprises an error message.
  • 227. The computer-readable medium of claim 222, wherein the message comprises a line number of the source code.
  • 228. The computer-readable medium of claim 227, wherein the portion of the source code corresponding to the message is located using the line number.
  • 229. The computer-readable medium of claim 222, wherein the message comprises a name of a file containing the source code.
  • 230. The computer-readable medium of claim 222, wherein the graphical representation comprises a class diagram.
  • 231. A computer-readable medium containing instructions for controlling a data processing system to perform a method, the data processing system having source code, the method comprising the steps of: displaying a graphical representation of the source code; detecting an error in the source code; generating a message reflecting the error; locating a portion of the source code corresponding to the message; displaying the portion of the source code corresponding to the message; and displaying the graphical representation of the portion of the source code corresponding to the message in a visually distinctive manner.
  • 232. The computer-readable medium of claim 231, wherein the message is generated by a verification tool.
  • 233. The computer-readable medium of claim 232, wherein the verification tool comprises a compiler.
  • 234. The computer-readable medium of claim 232, wherein the verification tool comprises a quality assurance module.
  • 235. The computer-readable medium of claim 231, wherein the message comprises an error message.
  • 236. The computer-readable medium of claim 231, wherein the message comprises a line number of the source code.
  • 237. The computer-readable medium of claim 236, wherein the portion of the source code corresponding to the message is located using the line number.
  • 238. The computer-readable medium of claim 231, wherein the message comprises a name of a file containing the source code.
  • 239. The computer-readable medium of claim 231, wherein the graphical representation comprises a class diagram.
  • 240. A computer-readable medium containing instructions for controlling a data processing system to perform a method, the data processing system having source code, the method comprising the steps of: detecting an error in the source code; generating a message reflecting the error; and displaying the graphical representation of a portion of the source code corresponding to the message in a visually distinctive manner.
  • 241. The computer-readable medium of claim 240, wherein the message is generated by a verification tool.
  • 242. The computer-readable medium of claim 241, wherein the verification tool comprises a compiler.
  • 243. The computer-readable medium of claim 241, wherein the verification tool comprises a quality assurance module.
  • 244. The computer-readable medium of claim 240, wherein the message comprises an error message.
  • 245. The computer-readable medium of claim 240, wherein the message comprises a line number of the source code.
  • 246. The computer-readable medium of claim 245, wherein the portion of the source code corresponding to the message is located using the line number.
  • 247. The computer-readable medium of claim 240, wherein the message comprises a name of a file containing the source code.
  • 248. The computer-readable medium of claim 240, wherein the graphical representation comprises a class diagram.
  • 249. A data processing system comprising: a secondary storage device further comprising source code; a memory device further comprising a program that displays a graphical representation of the source code, that receives a message corresponding to a portion of the source code, that locates the portion of the source code corresponding to the message, that displays the portion of the source code corresponding to the message, and that displays the graphical representation of the portion of the source code corresponding to the message in a visually distinctive manner; and a processor for running the program.
  • 250. The data processing system of claim 249, wherein the program further detects an error in the source code, and generates a message reflecting the error.
  • 251. The data processing system of claim 249, wherein the message is received from a verification tool.
  • 252. The data processing system of claim 251, wherein the verification tool comprises a compiler.
  • 253. The data processing system of claim 251, wherein the verification tool comprises a quality assurance module.
  • 254. The data processing system of claim 249, wherein the message comprises an error message.
  • 255. The data processing system of claim 249, wherein the message comprises a line number of the source code.
  • 256. The data processing system of claim 255, wherein the portion of the source code corresponding to the message is located using the line number.
  • 257. The data processing system of claim 249, wherein the message comprises a name of a file containing the source code.
  • 258. The data processing system of claim 249, wherein the graphical representation comprises a class diagram.
  • 259. A data processing system comprising: a secondary storage device further comprising source code; a memory device further comprising a program that displays a graphical representation of the source code, that detects an error in the source code, that generates a message reflecting the error, that locates a portion of the source code corresponding to the message, that displays the portion of the source code corresponding to the message, and that displays the graphical representation of the portion of the source code corresponding to the message in a visually distinctive manner; and a processor for running the program.
  • 260. The data processing system of claim 259, wherein the message is generated by a verification tool.
  • 261. The data processing system of claim 260, wherein the verification tool comprises a compiler.
  • 262. The data processing system of claim 260, wherein the verification tool comprises a quality assurance module.
  • 263. The data processing system of claim 259, wherein the message comprises an error message.
  • 264. The data processing system of claim 259, wherein the message comprises a line number of the source code.
  • 265. The data processing system of claim 264, wherein the portion of the source code corresponding to the message is located using the line number.
  • 266. The data processing system of claim 259, wherein the message comprises a name of a file containing the source code.
  • 267. The data processing system of claim 259, wherein the graphical representation comprises a class diagram.
  • 268. A system for developing source code comprising: means for receiving a message corresponding to a portion of the source code; and means for displaying the graphical representation of the portion of the source code corresponding to the message in a visually distinctive manner.
CROSS-REFERENCE TO RELATED APPLICATIONS

[0001] This application claims the benefit of the filing date of U.S. Provisional Application No. 60/199,046, entitled “Software Development Tool,” filed on Apr. 21, 2000, and is a continuation-in-part of U.S. patent application No. 09/680,063, entitled “Method and System for Developing Software,” filed on Oct. 4, 2000, which claims the benefit of the filing date of U.S. Provisional Application No. 60/157,826, entitled “Visual Unified Modeling Language Development Tool,” filed on Oct. 5, 1999, and U.S. Provisional Application No. 60/199,046, entitled “Software Development Tool,” filed on Apr. 21, 2000; all of which are incorporated herein by reference. [0002] The following identified U.S. patent applications are also relied upon and are incorporated by reference in this application: [0003] U.S. patent application No. 09/680,065, entitled “Method And System For Displaying Changes Of Source Code,” filed on Oct. 4, 2000; [0004] U.S. patent application No. 09/680,030, entitled “Method And System For Generating, Applying, And Defining A Pattern,” filed on Oct. 4, 2000; [0005] U.S. patent application No. 09/680,064, entitled “Method And System For Collapsing A Graphical Representation Of Related Elements,” filed on Oct. 4, 2000; [0006] U.S. patent application No. ______, entitled “Methods and Systems for Generating Source Code for Object Oriented Elements,” bearing attorney docket no. 30013630-0008, and filed on the same date herewith; [0007] U.S. patent application No. ______, entitled “Methods and Systems for Relating Data Structures and Object Oriented Elements for Distributed Computing,” bearing attorney docket no. 30013630-0009, and filed on the same date herewith; [0008] U.S. patent application No. ______, entitled “Methods and Systems for Finding and Displaying Linked Objects,” bearing attorney docket no. 30013630-0012, and filed on the same date herewith; [0009] U.S. patent application No. ______, entitled “Methods and Systems for Animating the Interaction of Objects in an Object Oriented Program,” bearing attorney docket no. 30013630-0013, and filed on the same date herewith; [0010] U.S. patent application No. ______, entitled “Methods and Systems for Supporting and Deploying Distributed Computing Components,” bearing attorney docket no. 30013630-0014, and filed on the same date herewith; [0011] U.S. patent application No. ______, entitled “Diagrammatic Control of a Software in a Version Control System,” bearing attorney docket no. 30013630-0015, and filed on the same date herewith; [0012] U.S. patent application No. ______, entitled “Navigation Links in Generated Documentation,” bearing attorney docket no. 30013630-0016, and filed on the same date herewith; [0013] U.S. patent application No. ______, entitled “Methods and Systems for Identifying Dependencies Between Object-Oriented Elements,” bearing attorney docket no. 30013630-0019, and filed on the same date herewith; and [0014] U.S. patent application No. ______, entitled “Methods and Systems for Relating a Data Definition File and a Data Model for Distributed Computing,” bearing attorney docket no. 30013630-0020, and filed on the same date herewith.

Provisional Applications (3)
Number Date Country
60199046 Apr 2000 US
60157826 Oct 1999 US
60199046 Apr 2000 US
Continuation in Parts (1)
Number Date Country
Parent 09680063 Oct 2000 US
Child 09839525 Apr 2001 US